Proverbs, aphorisms, quotations (English) | by Linux fortune |
A famous Lisp Hacker noticed an Undergraduate sitting in front of a Xerox 1108, trying to edit a complex Klone network via a browser. Wanting to help, the Hacker clicked one of the nodes in the network with the mouse, and asked "what do you see?" Very earnestly, the Undergraduate replied "I see a cursor." The Hacker then quickly pressed the boot toggle at the back of the keyboard, while simultaneously hitting the Undergraduate over the head with a thick Interlisp Manual. The Undergraduate was then Enlightened. | |
A hacker does for love what others would not do for money. | |
A student, in hopes of understanding the Lambda-nature, came to Greenblatt. As they spoke a Multics system hacker walked by. "Is it true", asked the student, "that PL-1 has many of the same data types as Lisp?" Almost before the student had finished his question, Greenblatt shouted, "FOO!", and hit the student with a stick. | |
Hacker's Guide To Cooking: 2 pkg. cream cheese (the mushy white stuff in silver wrappings that doesn't really come from Philadelphia after all; anyway, about 16 oz.) 1 tsp. vanilla extract (which is more alcohol than vanilla and pretty strong so this part you *GOTTA* measure) 1/4 cup sugar (but honey works fine too) 8 oz. Cool Whip (the fluffy stuff devoid of nutritional value that you can squirt all over your friends and lick off...) "Blend all together until creamy with no lumps." This is where you get to join(1) all the raw data in a big buffer and then filter it through merge(1m) with the -thick option, I mean, it starts out ultra lumpy and icky looking and you have to work hard to mix it. Try an electric beater if you have a cat(1) that can climb wall(1s) to lick it off the ceiling(3m). "Pour into a graham cracker crust..." Aha, the BUGS section at last. You just happened to have a GCC sitting around under /etc/food, right? If not, don't panic(8), merely crumble a rand(3m) handful of innocent GCs into a suitable tempfile and mix in some melted butter. "...and refrigerate for an hour." Leave the recipe's stdout in a fridge for 3.6E6 milliseconds while you work on cleaning up stderr, and by time out your cheesecake will be ready for stdin. | |
If Machiavelli were a hacker, he'd have worked for the CSSG. -- Phil Lapsley | |
In a surprise raid last night, federal agents ransacked a house in search of a rebel computer hacker. However, they were unable to complete the arrest because the warrant was made out in the name of Don Provan, while the only person in the house was named don provan. Proving, once again, that Unix is superior to Tops10. | |
`Lasu' Releases SAG 0.3 -- Freeware Book Takes Paves For New World Order by staff writers ... The central Superhighway site called ``sunsite.unc.edu'' collapsed in the morning before the release. News about the release had been leaked by a German hacker group, Harmonious Hardware Hackers, who had cracked into the author's computer earlier in the week. They had got the release date wrong by one day, and caused dozens of eager fans to connect to the sunsite computer at the wrong time. ``No computer can handle that kind of stress,'' explained the mourning sunsite manager, Erik Troan. ``The spinning disks made the whole computer jump, and finally it crashed through the floor to the basement.'' Luckily, repairs were swift and the computer was working again the same evening. ``Thank God we were able to buy enough needles and thread and patch it together without major problems.'' The site has also installed a new throttle on the network pipe, allowing at most four clients at the same time, thus making a new crash less likely. ``The book is now in our Incoming folder'', says Troan, ``and you're all welcome to come and get it.'' -- Lars Wirzenius <wirzeniu@cs.helsinki.fi> [comp.os.linux.announce] | |
The FIELD GUIDE to NORTH AMERICAN MALES SPECIES: Cranial Males SUBSPECIES: The Hacker (homo computatis) Courtship & Mating: Due to extreme deprivation, HOMO COMPUTATIS maintains a near perpetual state of sexual readiness. Courtship behavior alternates between awkward shyness and abrupt advances. When he finally mates, he chooses a female engineer with an unblinking stare, a tight mouth, and a complete collection of Campbell's soup-can recipes. Track: Trash cans full of pale green and white perforated paper and old copies of the Allen-Bradley catalog. Comments: Extremely fond of bad puns and jokes that need long explanations. | |
The FIELD GUIDE to NORTH AMERICAN MALES SPECIES: Cranial Males SUBSPECIES: The Hacker (homo computatis) Description: Gangly and frail, the hacker has a high forehead and thinning hair. Head disproportionately large and crooked forward, complexion wan and sightly gray from CRT illumination. He has heavy black-rimmed glasses and a look of intense concentration, which may be due to a software problem or to a pork-and-bean breakfast. Feathering: HOMO COMPUTATIS saw a Brylcreem ad fifteen years ago and believed it. Consequently, crest is greased down, except for the cowlick. Song: A rather plaintive "Is it up?" | |
The FIELD GUIDE to NORTH AMERICAN MALES SPECIES: Cranial Males SUBSPECIES: The Hacker (homo computatis) Plumage: All clothes have a slightly crumpled look as though they came off the top of the laundry basket. Style varies with status. Hacker managers wear gray polyester slacks, pink or pastel shirts with wide collars, and paisley ties; staff wears cinched-up baggy corduroy pants, white or blue shirts with button-down collars, and penholder in pocket. Both managers and staff wear running shoes to work, and a black plastic digital watch with calculator. | |
Unix is a lot more complicated (than CP/M) of course -- the typical Unix hacker can never remember what the PRINT command is called this week -- but when it gets right down to it, Unix is a glorified video game. People don't do serious work on Unix systems; they send jokes around the world on USENET or write adventure games and research papers. -- E. Post "Real Programmers Don't Use Pascal", Datamation, 7/83 | |
"Don't talk to me about disclaimers! I invented disclaimers!" -- The Censored Hacker | |
Dinner suggestion #302 (Hacker's De-lite): 1 tin imported Brisling sardines in tomato sauce 1 pouch Chocolate Malt Carnation Instant Breakfast 1 carton milk | |
Hacker's Law: The belief that enhanced understanding will necessarily stir a nation to action is one of mankind's oldest illusions. | |
Hacker's Quicky #313: Sour Cream -n- Onion Potato Chips Microwave Egg Roll Chocolate Milk | |
hacker, n.: A master byter. | |
hacker, n.: Originally, any person with a knack for coercing stubborn inanimate things; hence, a person with a happy knack, later contracted by the mythical philosopher Frisbee Frobenius to the common usage, 'hack'. In olden times, upon completion of some particularly atrocious body of coding that happened to work well, culpable programmers would gather in a small circle around a first edition of Knuth's Best Volume I by candlelight, and proceed to get very drunk while sporadically rending the following ditty: Hacker's Fight Song He's a Hack! He's a Hack! He's a guy with the happy knack! Never bungles, never shirks, Always gets his stuff to work! All take a drink (important!) | |
QOTD: I opened Pandora's box, let the cat out of the bag and put the ball in their court. -- Hon. J. Hacker (The Ministry of Administrative Affairs) | |
Q: How does a hacker fix a function which doesn't work for all of the elements in its domain? A: He changes the domain. | |
An Hacker there was, one of the finest sort Who controlled the system; graphics was his sport. A manly man, to be a wizard able; Many a protected file he had sitting on his table. His console, when he typed, a man might hear Clicking and feeping wind as clear, Aye, and as loud as does the machine room bell Where my lord Hacker was Prior of the cell. The Rule of good St Savage or St Doeppnor As old and strict he tended to ignore; He let go by the things of yesterday And took the modern world's more spacious way. He did not rate that text as a plucked hen Which says that Hackers are not holy men. And that a hacker underworked is a mere Fish out of water, flapping on the pier. That is to say, a hacker out of his cloister. That was a text he held not worth an oyster. And I agreed and said his views were sound; Was he to study till his head wend round Poring over books in the cloisters? Must he toil As Andy bade and till the very soil? Was he to leave the world upon the shelf? Let Andy have his labor to himself! -- Chaucer [well, almost. Ed.] | |
Eleanor Rigby Sits at the keyboard And waits for a line on the screen Lives in a dream Waits for a signal Finding some code That will make the machine do some more. What is it for? All the lonely users, where do they all come from? All the lonely users, why does it take so long? Hacker MacKensie Writing the code for a program that no one will run It's nearly done Look at him working, fixing the bugs in the night when there's nobody there. What does he care? All the lonely users, where do they all come from? All the lonely users, why does it take so long? Ah, look at all the lonely users. Ah, look at all the lonely users. | |
"I thought that you said you were 20 years old!" "As a programmer, yes," she replied, "And you claimed to be very near two meters tall!" "You said you were blonde, but you lied!" Oh, she was a hacker and he was one, too, They had so much in common, you'd say. They exchanged jokes and poems, and clever new hacks, And prompts that were cute or risque'. He sent her a picture of his brother Sam, She sent one from some past high school day, And it might have gone on for the rest of their lives, If they hadn't met in L.A. "Your beard is an armpit," she said in disgust. He answered, "Your armpit's a beard!" And they chorused: "I think I could stand all the rest If you were not so totally weird!" If she had not said what he wanted to hear, And he had not done just the same, They'd have been far more honest, and never have met, And would not have had fun with the game. -- Judith Schrier, "Face to Face After Six Months of Electronic Mail" | |
She can kill all your files; She can freeze with a frown. And a wave of her hand brings the whole system down. And she works on her code until ten after three. She lives like a bat but she's always a hacker to me. -- Apologies to Billy Joel | |
"The straightforward and easy path was to join the proprietary software world, signing nondisclosure agreements and promising not to help my fellow hacker....I could have made money this way, and perhaps had fun programming (if I closed my eyes to how I was treating other people). But I knew that when my career was over, I would look back on years of building walls to divide people, and feel I had made the world ugly." -- Richard Stallman (Open Sources, 1999 O'Reilly and Associates) | |
"CmdrBurrito" Launches Slashdot.org Parody An anonymous hacker with the handle "CmdrBurrito" has launched a parody of the Slashdot "News for Nerds" site entitled Dotslash. Dotslash has the motto "Snooze for Slackers. Stuff that Scatters." It has fake news articles and ficticious reader comments. Some of the recent articles include "Bill Gates Wins Powerball Jackpot," "Linux 2.1.666 Released," and "Supercomputer Created from 8088 and Z80 Computers." Rumor has it that "CmdrBurrito" plans to create parodies of other sites, including Linux Weekly News ("Linsux Weakly Snooze"), Freshmeat ("Deadmeat"), and Linux.org ("Linsux.org"). When asked about Dotslash, Slashdot webmaster Rob "CmdrTaco" Malda said, "No problem. I simply posted an article about it on Slashdot, and watched it die from the 'Slashdot Effect.' Six hours later, and it's still offline. I suspect Dotslash is running Windows NT. The mystery 'CmdrBurrito' character is probably a bored Microsoft employee." | |
Dave Finton gazes into his crystal ball... January 2099: Rob Malda Finally Gets His Damned Nano-Technology The Linux hacker community finally breathed a collective sigh of relief when it was announced that Rob Malda finally got his damned nanotechnology. "It's about time!" exclaimed one Dothead. "He been going on about that crap since god-knows-when. Now that he's got that and those wearable computers, maybe we can read about something interesting on Slashdot!" Observers were skeptical, however. Already the now-immortal Rob Malda nano-cyborg (who reportedly changed his name to "18 of 49, tertiary adjunct of something-or-other") has picked up a few new causes to shout about to the high heavens until everyone's ears start bleeding. In one Slashdot article, Malda writes "Here's an article about the potential of large greyish high-tech mile-wide cubes flying through space, all controlled by a collective mind set upon intergalactic conquest. Personally, I can't wait. Yum." | |
Jargon Coiner (#6) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * STOP MIRAGE: Trying to click on an imaginary Stop button on a program's toolbar after doing something you didn't want to. Usually caused as the result of excessive use of Netscape. * YA-PREFIX: Putting "another" or "yet another" in front of a name or tacking "YA" in front of an acronym. Example: "We could ya-prefix this fortune by titling it 'Yet Another Lame List of Fabricated Jargon'." * DOMAINEERING: Using a service like Netcraft to determine what operating system and webserver a particular domain is running. * NOT-A-SALTINE EXPLANATION: The canned response given to someone who uses the term "hacker" instead of "cracker". | |
What Did Santa Claus Bring You In 1999? (#1) LINUS TORVALDS: Santa didn't bring me anything, but Tim O'Reilly just gave me a large sum of money to publish my new book, "Linus Torvalds' Official Guide To Receiving Fame, Fortune, and Hot Babes By Producing Your Own Unix-Like Operating System In Only 10 Years". ORDINARY LINUX HACKER: I kept hinting to my friends and family that I wanted to build my own Beowulf Cluster. My grandmother got mixed up and gave me a copy of "Beowulf's Chocolate Cluster Cookbook". I like chocolate, but I would've preferred silicon. LINUX LONGHAIR: My friends sent me a two-year subscription to several Ziff-Davis publications, much to my dislike. I don't want to read Jesse Berst's rants against Linux, or John Dvorak's spiels about how great Windows 2000 is. Still, I suppose this isn't so bad. Ziff-Davis glossy paper makes an excellent lining for fireplaces. | |
Excerpts From The First Annual Nerd Bowl (#1) JOHN SPLADDEN: Hi, and welcome to the first annual Nerd Bowl in sunny Silicon Valley. BRYANT DUMBELL: We're coming to you live from the Transmeta Dome to watch the battle between the North Carolina Mad Hatters and the Michigan Portalbacks as they compete for the coveted Linus Torvalds Trophy. SPLADDEN: This is shaping up to be one hell of a match. The Mad Hatters -- sponsored by Linux distributor Red Hat -- have been on fire the past month. But the Andover.Net sponsored Michigan Portalbacks are on a tear as well, thanks in part to the stellar performance of Rob "Taco Boy" Malda. DUMBELL: Taco Boy is quite a star, John. Last week at the Kernelbowl he blew away the Transmeta Secret Agents when he scored 51 points singlehandedly in the Flying CompactDiscus round. SPLADDEN: But then Mad Hatter's Alan Cox was voted this season's Most Valuable Hacker in the Eastern Division. So, this game is going to be quite a show. | |
Affordable Virtual Beowulf Cluster Every nerd drools over Beowulf clusters, but very few have even seen one, much less own one. Until now, that is. Eric Gylgen, the open source hacker famous for EviL (the dancing ASCII paperclip add-on to vi), is working on a program that will emulate Beowulf clusters on a standard desktop PC. "Of course," he added candidly, "the performance of my virtual cluster will be many orders of magnitude less than a real cluster, but that's not really the point. I just want to be able to brag that I run a 256 node cluster. Nobody has to know I only spent $500 on the hardware it uses." Eric has prior experience in this field. Last month he successfully built a real 32 node Beowulf cluster out of Palm Pilots, old TI-8x graphing calculators, various digital cameras, and even some TRS-80s. He demonstrated a pre-alpha version of his VirtualEpicPoem software to us yesterday. His Athlon machine emulated a 256 node Beowulf cluster in which each node, running Linux, was emulating its own 16 node cluster in which each node, running Bochs, was emulating VMWare to emulate Linux running old Amiga software. The system was extremely slow, but it worked. | |
Brief History Of Linux (#21) The GNU Project Meet Richard M. Stallman, an MIT hacker who would found the GNU Project and create Emacs, the operating-system-disguised-as-a-text-editor. RMS, the first member of the Three Initials Club (joined by ESR and JWZ), experienced such frustration with software wrapped in arcane license agreements that he embarked on the GNU Project to produce free software. His journey began when he noticed this fine print for a printer driver: You do not own this software. You own a license to use one copy of this software, a license that we can revoke at any time for any reason whatsoever without a refund. You may not copy, distribute, alter, disassemble, or hack the software. The source code is locked away in a vault in Cleveland. If you say anything negative about this software you will be in violation of this license and required to forfeit your soul and/or first born child to us. The harsh wording of the license shocked RMS. The computer industry was in it's infancy, which could only mean it was going to get much, much worse. | |
Brief History Of Linux (#23) Linus Torvalds certainly wasn't the only person to create their own operating system from scratch. Other people working from their leaky basements did create their own systems and now they are sick that they didn't become an Alpha Geek like Torvalds or a Beta Geek like Alan Cox. Linus had one advantage not many else did: Internet access. The world was full of half-implemented-Unix-kernels at the time, but they were sitting isolated on some hacker's hard drive, destined to be destroyed by a hard drive crash. Thankfully that never happened to Linux, mostly because everyone with Net access could download a copy instead of paying shipping charges to receive the code on a huge stack of unreliable floppy disks. Indeed, buried deep within a landfill in Lansing, Michigan sits a stack of still-readable 5-1/4 floppies containing the only known copy of "Windows Killer", a fully functional Unix kernel so elegant, so efficient, so easy-to-use that Ken Thompson himself would be jealous of its design. Unfortunately the author's mother threw out the stack of floppies in a bout of spring cleaning. The 14 year old author's talents were lost forever as his parents sent him to Law School. | |
Brief History Of Linux (#25) By the mid-1990's the Linux community was burgeoning as countless geeks fled Redmond monopolistic oppression, Armonk cluelessness, and Cupertino click-and-drool reality distortion fields. By late 1991 there was an informal Linux User Group in Finland, although its primary focus was Linux advocacy, not drinking beer and telling Microsoft jokes as most do today. Kernel development continued at a steady clip, with more and more people joining in and hoping that their patches would be accepted by the Benevolent Dictator himself. To have a patch accepted by Linus was like winning the Nobel Prize, but to face rejection was like being rejected from Clown College. The reputation game certainly sparked some flame wars. One of the most memorable crisis was over the behavior of the delete and backspace keys. A certain faction of hackers wanted the Backspace key to actually backspace and the Delete key to actually delete. Linus wasn't too keen on the proposed changes; "It Works For Me(tm)" is all he said. Some observers now think Linus was pulling rank to get back at the unknown hacker who managed to slip a patch by him that replaced the "Kernel panic" error with "Kernel panic: Linus probably fscked it all up again". | |
"Brown Orifice" Is Only The Beginning Last week security holes were found in Netscape's Java implementation that allowed it to act as a web server. Earlier today, a hacker announced that he had found vulnerabilities in Mozilla M17 that allow it to operate as a web browser. And that's just the beginning. Said "3l337h4x0r", the discoverer of the M17 exploit, "This is quite a hack! By manipulating some internal functions, I was able to use M17 to actually surf the web. Slashdot and Humorix rendered beautifully." Mozilla engineers were stunned. "This shouldn't be possible. M17 contains a newsreader, a mail client, an instant messenger client, and a whole bunch of XUL acronymn-enriched stuff, but it shouldn't be able to handle HTTP or HTML. We haven't been planning on adding web-surfing functionality to Mozilla until M30... maybe M25 at the earliest. I suspect this whole thing is a hoax." | |
Microsoft Fights Linux -- By Contributing Kernel Patches If you can't beat 'em, join 'em... and then destory 'em. That seems to be the new Microsoft strategy for dealing with Linux. Instead of fighting a FUD or patent war, Microsoft operatives are doing something totally out of character: they are contributing patches for the Linux kernel and other programs. Don't worry, Microsoft is still evil. It's all part of a massive denial of service attack against Linus Torvalds designed to bring kernel development to a standstill. By sending over 10,000 patches per minute by email to Linus and other top kernel hackers, Microsoft has exposed Linux's Achilles heel. "I can't believe this is happening!" one stressed-out kernel hacker said at a press conference on IRC. "If this goes on, we may have to conduct kernel development over some other network protocol, like avian carriers... Aw crap, there's smoke coming from my email server! Ahh... it can't handle the load!" At this point the developer cut off and we haven't heard from him since. At first Linus was unsure where the deluge of patches was coming from. But when he saw one patch to replace kernel panics with bluescreens, the source was pretty obvious. "Oh, and the fact that all of the patches are covered by Microsoft's GPL [Grossly Private License] was a dead giveaway, too," | |
"Linux kernel development is dominated by a hacker ethos, in which external documentation is held in contempt, and even code comments are viewed with suspicion." - Jerry Epplin | |
In personal conversations with technical people, I call myself a hacker. But when I'm talking to journalists I just say "programmer" or something like that. - Linus Torvalds | |
Russell King wrote: > I'll look into it, produce a patch, but I'm not a VM hacker. You know what a pte is so you're a VM hacker ;-) - Daniel Phillips on linux-kernel | |
<netgod> my client has been owned severely <netgod> this guy got root, ran packet sniffers, installed .rhosts and backdoors, put a whole new dir in called /lib/" ", which has a full suite of smurfing and killing tools <netgod> the only mistake was not deleting the logfiles <netgod> question is how was root hacked, and that i couldnt tell u <netgod> it is, of course, not a debian box * netgod notes the debian box is the only one left untouched by the hacker -- wonder why | |
AP/STT. Helsinki, Dec 5th, 6:22 AM. For immediate release. In order to allay fears about the continuity of the Linux project, Linus Torvalds together with his manager Tove Monni have released "Linus v2.0", affectionately known as "Kernel Hacker - The Next Generation". Linux stock prices on Wall Street rose sharply after the announcement; as one well-known analyst who wishes to remain anonymous says - "It shows a long-term commitment, and while we expect a short-term decrease in productivity, we feel that this solidifies the development in the long run". Other analysts downplay the importance of the event, and claim that just about anybody could have done it. "I'm glad somebody finally told them about the birds and the bees" one sceptic comments cryptically. But even the skeptics agree that it is an interesting turn of events. Others bring up other issues with the new version - "I'm especially intrigued by the fact that the new version is female, and look forward to seeing what the impact of that will be on future development. Will "Red Hat Linux" change to "Pink Hat Linux", for example?" -- Linus Torvalds announcing that he became father of a girl | |
As to house maintenance, does it involve problem solfing? If so, your hacker can safely be left to deall with the panning (for the musement value, if nothering ese). -- Telsa Gwynne | |
Boss: You forgot to assign the result of your map! Hacker: Dang, I'm always forgetting my assignations... Boss: And what's that "goto" doing there?!? Hacker: Er, I guess my finger slipped when I was typing "getservbyport"... Boss: Ah well, accidents will happen. Maybe we should have picked APL. -- Larry Wall in <199710311732.JAA19169@wall.org> |