DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
Hacker
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

A famous Lisp Hacker noticed an Undergraduate sitting in front of a Xerox
1108, trying to edit a complex Klone network via a browser. Wanting to
help, the Hacker clicked one of the nodes in the network with the mouse,
and asked "what do you see?" Very earnestly, the Undergraduate replied "I
see a cursor." The Hacker then quickly pressed the boot toggle at the back
of the keyboard, while simultaneously hitting the Undergraduate over the head
with a thick Interlisp Manual.  The Undergraduate was then Enlightened.
A hacker does for love what others would not do for money.
A student, in hopes of understanding the Lambda-nature, came to Greenblatt.
As they spoke a Multics system hacker walked by.  "Is it true", asked the
student, "that PL-1 has many of the same data types as Lisp?"  Almost before
the student had finished his question, Greenblatt shouted, "FOO!", and hit
the student with a stick.
Hacker's Guide To Cooking:
2 pkg. cream cheese (the mushy white stuff in silver wrappings that doesn't
        really  come from Philadelphia after all; anyway, about 16 oz.)
1 tsp. vanilla  extract  (which is more alcohol than vanilla and pretty
        strong so this part you *GOTTA* measure)
1/4 cup sugar (but honey works fine too)
8 oz. Cool Whip (the fluffy stuff devoid of nutritional value that you
        can squirt all over your friends and lick off...)
"Blend all together until creamy with no lumps."  This is where you get to
        join(1) all the raw data in a big buffer and then filter it through
        merge(1m) with the -thick option, I mean, it starts out ultra lumpy
        and icky looking and you have to work hard to mix it.  Try an electric
        beater if you have a cat(1) that can climb wall(1s) to lick it off
        the ceiling(3m).
"Pour into a graham cracker crust..."  Aha, the BUGS section at last.  You
        just happened  to have a GCC sitting around under /etc/food, right?
        If not, don't panic(8), merely crumble a rand(3m) handful of innocent
        GCs into a suitable tempfile and mix in some melted butter.
"...and  refrigerate for an hour."  Leave the  recipe's  stdout in a fridge
        for 3.6E6 milliseconds while you work on cleaning up stderr, and
        by time out your cheesecake will be ready for stdin.
If Machiavelli were a hacker, he'd have worked for the CSSG.
                -- Phil Lapsley
In a surprise raid last night, federal agents ransacked a house in search
of a rebel computer hacker.  However, they were unable to complete the arrest
because the warrant was made out in the name of Don Provan, while the only
person in the house was named don provan.  Proving, once again, that Unix is
superior to Tops10.
`Lasu' Releases SAG 0.3 -- Freeware Book Takes Paves For New World Order
by staff writers

        ...
        The central Superhighway site called ``sunsite.unc.edu''
collapsed in the morning before the release.  News about the release had
been leaked by a German hacker group, Harmonious Hardware Hackers, who
had cracked into the author's computer earlier in the week.  They had
got the release date wrong by one day, and caused dozens of eager fans
to connect to the sunsite computer at the wrong time.  ``No computer can
handle that kind of stress,'' explained the mourning sunsite manager,
Erik Troan.  ``The spinning disks made the whole computer jump, and
finally it crashed through the floor to the basement.''  Luckily,
repairs were swift and the computer was working again the same evening.
``Thank God we were able to buy enough needles and thread and patch it
together without major problems.''  The site has also installed a new
throttle on the network pipe, allowing at most four clients at the same
time, thus making a new crash less likely.  ``The book is now in our
Incoming folder'', says Troan, ``and you're all welcome to come and get it.''
                -- Lars Wirzenius <wirzeniu@cs.helsinki.fi>
                   [comp.os.linux.announce]
        The FIELD GUIDE to NORTH AMERICAN MALES

SPECIES:        Cranial Males
SUBSPECIES:        The Hacker (homo computatis)
Courtship & Mating:
        Due to extreme deprivation, HOMO COMPUTATIS maintains a near perpetual
        state of sexual readiness.  Courtship behavior alternates between
        awkward shyness and abrupt advances.  When he finally mates, he
        chooses a female engineer with an unblinking stare, a tight mouth, and
        a complete collection of Campbell's soup-can recipes.
Track:
        Trash cans full of pale green and white perforated paper and old
        copies of the Allen-Bradley catalog.
Comments:
        Extremely fond of bad puns and jokes that need long explanations.
        The FIELD GUIDE to NORTH AMERICAN MALES

SPECIES:        Cranial Males
SUBSPECIES:        The Hacker (homo computatis)
Description:
        Gangly and frail, the hacker has a high forehead and thinning hair.
        Head disproportionately large and crooked forward, complexion wan and
        sightly gray from CRT illumination.  He has heavy black-rimmed glasses
        and a look of intense concentration, which may be due to a software
        problem or to a pork-and-bean breakfast.
Feathering:
        HOMO COMPUTATIS saw a Brylcreem ad fifteen years ago and believed it.
        Consequently, crest is greased down, except for the cowlick.
Song:
        A rather plaintive "Is it up?"
        The FIELD GUIDE to NORTH AMERICAN MALES

SPECIES:        Cranial Males
SUBSPECIES:        The Hacker (homo computatis)
Plumage:
        All clothes have a slightly crumpled look as though they came off the
        top of the laundry basket.  Style varies with status.  Hacker managers
        wear gray polyester slacks, pink or pastel shirts with wide collars,
        and paisley ties; staff wears cinched-up baggy corduroy pants, white
        or blue shirts with button-down collars, and penholder in pocket.
        Both managers and staff wear running shoes to work, and a black
        plastic digital watch with calculator.
Unix is a lot more complicated (than CP/M) of course -- the typical Unix
hacker can never remember what the PRINT command is called this week --
but when it gets right down to it, Unix is a glorified video game.
People don't do serious work on Unix systems; they send jokes around the
world on USENET or write adventure games and research papers.
                -- E. Post
                "Real Programmers Don't Use Pascal", Datamation, 7/83
"Don't talk to me about disclaimers!  I invented disclaimers!"
-- The Censored Hacker
Dinner suggestion #302 (Hacker's De-lite):
        1 tin imported Brisling sardines in tomato sauce
        1 pouch Chocolate Malt Carnation Instant Breakfast
        1 carton milk
Hacker's Law:
        The belief that enhanced understanding will necessarily stir
        a nation to action is one of mankind's oldest illusions.
Hacker's Quicky #313:
        Sour Cream -n- Onion Potato Chips
        Microwave Egg Roll
        Chocolate Milk
hacker, n.:
        A master byter.
hacker, n.:
        Originally, any person with a knack for coercing stubborn inanimate
        things; hence, a person with a happy knack, later contracted by the
        mythical philosopher Frisbee Frobenius to the common usage, 'hack'.
        In olden times, upon completion of some particularly atrocious body
        of coding that happened to work well, culpable programmers would gather
        in a small circle around a first edition of Knuth's Best Volume I by
        candlelight, and proceed to get very drunk while sporadically rending
        the following ditty:

                Hacker's Fight Song

                He's a Hack!  He's a Hack!
                He's a guy with the happy knack!
                Never bungles, never shirks,
                Always gets his stuff to work!

All take a drink (important!)
QOTD:
        I opened Pandora's box, let the cat out of the bag and put the
        ball in their court.
                -- Hon. J. Hacker (The Ministry of Administrative Affairs)
Q:        How does a hacker fix a function which
        doesn't work for all of the elements in its domain?
A:        He changes the domain.
An Hacker there was, one of the finest sort
Who controlled the system; graphics was his sport.
A manly man, to be a wizard able;
Many a protected file he had sitting on his table.
His console, when he typed, a man might hear
Clicking and feeping wind as clear,
Aye, and as loud as does the machine room bell
Where my lord Hacker was Prior of the cell.
The Rule of good St Savage or St Doeppnor
As old and strict he tended to ignore;
He let go by the things of yesterday
And took the modern world's more spacious way.
He did not rate that text as a plucked hen
Which says that Hackers are not holy men.
And that a hacker underworked is a mere
Fish out of water, flapping on the pier.
That is to say, a hacker out of his cloister.
That was a text he held not worth an oyster.
And I agreed and said his views were sound;
Was he to study till his head wend round
Poring over books in the cloisters?  Must he toil
As Andy bade and till the very soil?
Was he to leave the world upon the shelf?
Let Andy have his labor to himself!
                -- Chaucer
                [well, almost.  Ed.]
Eleanor Rigby
        Sits at the keyboard
        And waits for a line on the screen
Lives in a dream
Waits for a signal
        Finding some code
        That will make the machine do some more.
What is it for?

All the lonely users, where do they all come from?
All the lonely users, why does it take so long?

Hacker MacKensie
Writing the code for a program that no one will run
It's nearly done
Look at him working, fixing the bugs in the night when there's
        nobody there.
What does he care?

All the lonely users, where do they all come from?
All the lonely users, why does it take so long?
Ah, look at all the lonely users.
Ah, look at all the lonely users.
"I thought that you said you were 20 years old!"
"As a programmer, yes," she replied,
"And you claimed to be very near two meters tall!"
"You said you were blonde, but you lied!"
Oh, she was a hacker and he was one, too,
They had so much in common, you'd say.
They exchanged jokes and poems, and clever new hacks,
And prompts that were cute or risque'.
He sent her a picture of his brother Sam,
She sent one from some past high school day,
And it might have gone on for the rest of their lives,
If they hadn't met in L.A.
"Your beard is an armpit," she said in disgust.
He answered, "Your armpit's a beard!"
And they chorused: "I think I could stand all the rest
If you were not so totally weird!"
If she had not said what he wanted to hear,
And he had not done just the same,
They'd have been far more honest, and never have met,
And would not have had fun with the game.
                -- Judith Schrier, "Face to Face After Six Months of
                Electronic Mail"
She can kill all your files;
She can freeze with a frown.
And a wave of her hand brings the whole system down.
And she works on her code until ten after three.
She lives like a bat but she's always a hacker to me.
                -- Apologies to Billy Joel
"The straightforward and easy path was to join the proprietary software world, signing nondisclosure agreements and promising not to help my fellow hacker....I could have made money this way, and perhaps had fun programming (if I closed my eyes to how I was treating other people).  But I knew that when my career was over, I would look back on years of building walls to divide people, and feel I had made the world ugly."

  -- Richard Stallman (Open Sources, 1999 O'Reilly and Associates)
"CmdrBurrito" Launches Slashdot.org Parody

An anonymous hacker with the handle "CmdrBurrito" has launched a parody of the
Slashdot "News for Nerds" site entitled Dotslash. Dotslash has the motto
"Snooze for Slackers. Stuff that Scatters." It has fake news articles and
ficticious reader comments. Some of the recent articles include "Bill Gates
Wins Powerball Jackpot," "Linux 2.1.666 Released," and "Supercomputer Created
from 8088 and Z80 Computers." Rumor has it that "CmdrBurrito" plans to create
parodies of other sites, including Linux Weekly News ("Linsux Weakly Snooze"),
Freshmeat ("Deadmeat"), and Linux.org ("Linsux.org").

When asked about Dotslash, Slashdot webmaster Rob "CmdrTaco" Malda said, "No
problem. I simply posted an article about it on Slashdot, and watched it die
from the 'Slashdot Effect.' Six hours later, and it's still offline. I suspect
Dotslash is running Windows NT. The mystery 'CmdrBurrito' character is probably
a bored Microsoft employee."
Dave Finton gazes into his crystal ball...

January 2099: Rob Malda Finally Gets His Damned Nano-Technology

The Linux hacker community finally breathed a collective sigh of relief
when it was announced that Rob Malda finally got his damned
nanotechnology.

"It's about time!" exclaimed one Dothead. "He been going on about that
crap since god-knows-when. Now that he's got that and those wearable
computers, maybe we can read about something interesting on Slashdot!"

Observers were skeptical, however. Already the now-immortal Rob Malda
nano-cyborg (who reportedly changed his name to "18 of 49, tertiary
adjunct of something-or-other") has picked up a few new causes to shout
about to the high heavens until everyone's ears start bleeding. In one
Slashdot article, Malda writes "Here's an article about the potential of
large greyish high-tech mile-wide cubes flying through space, all
controlled by a collective mind set upon intergalactic conquest.
Personally, I can't wait. Yum."
Jargon Coiner (#6)

An irregular feature that aims to give you advance warning of new jargon
that we've just made up.

* STOP MIRAGE: Trying to click on an imaginary Stop button on a program's
  toolbar after doing something you didn't want to. Usually caused as the
  result of excessive use of Netscape.

* YA-PREFIX: Putting "another" or "yet another" in front of a name or
  tacking "YA" in front of an acronym.

  Example: "We could ya-prefix this fortune by titling it 'Yet Another
  Lame List of Fabricated Jargon'."

* DOMAINEERING: Using a service like Netcraft to determine what operating
  system and webserver a particular domain is running.

* NOT-A-SALTINE EXPLANATION: The canned response given to someone who
  uses the term "hacker" instead of "cracker".
What Did Santa Claus Bring You In 1999? (#1)

LINUS TORVALDS: Santa didn't bring me anything, but Tim O'Reilly just gave
me a large sum of money to publish my new book, "Linus Torvalds' Official
Guide To Receiving Fame, Fortune, and Hot Babes By Producing Your Own
Unix-Like Operating System In Only 10 Years".

ORDINARY LINUX HACKER: I kept hinting to my friends and family that I
wanted to build my own Beowulf Cluster. My grandmother got mixed up and
gave me a copy of "Beowulf's Chocolate Cluster Cookbook". I like
chocolate, but I would've preferred silicon.

LINUX LONGHAIR: My friends sent me a two-year subscription to several
Ziff-Davis publications, much to my dislike. I don't want to read Jesse
Berst's rants against Linux, or John Dvorak's spiels about how great
Windows 2000 is. Still, I suppose this isn't so bad. Ziff-Davis glossy
paper makes an excellent lining for fireplaces.
Excerpts From The First Annual Nerd Bowl (#1)

JOHN SPLADDEN: Hi, and welcome to the first annual Nerd Bowl in sunny
Silicon Valley.

BRYANT DUMBELL: We're coming to you live from the Transmeta Dome to watch
the battle between the North Carolina Mad Hatters and the Michigan
Portalbacks as they compete for the coveted Linus Torvalds Trophy.

SPLADDEN: This is shaping up to be one hell of a match. The Mad Hatters --
sponsored by Linux distributor Red Hat -- have been on fire the past
month. But the Andover.Net sponsored Michigan Portalbacks are on a tear as
well, thanks in part to the stellar performance of Rob "Taco Boy" Malda.

DUMBELL: Taco Boy is quite a star, John. Last week at the Kernelbowl he
blew away the Transmeta Secret Agents when he scored 51 points
singlehandedly in the Flying CompactDiscus round.

SPLADDEN: But then Mad Hatter's Alan Cox was voted this season's Most
Valuable Hacker in the Eastern Division. So, this game is going to be
quite a show.
Affordable Virtual Beowulf Cluster

Every nerd drools over Beowulf clusters, but very few have even seen one,
much less own one. Until now, that is. Eric Gylgen, the open source hacker
famous for EviL (the dancing ASCII paperclip add-on to vi), is working on
a program that will emulate Beowulf clusters on a standard desktop PC.

"Of course," he added candidly, "the performance of my virtual cluster
will be many orders of magnitude less than a real cluster, but that's not
really the point. I just want to be able to brag that I run a 256 node
cluster. Nobody has to know I only spent $500 on the hardware it uses."

Eric has prior experience in this field. Last month he successfully built
a real 32 node Beowulf cluster out of Palm Pilots, old TI-8x graphing
calculators, various digital cameras, and even some TRS-80s.

He demonstrated a pre-alpha version of his VirtualEpicPoem software to us
yesterday. His Athlon machine emulated a 256 node Beowulf cluster in which
each node, running Linux, was emulating its own 16 node cluster in which
each node, running Bochs, was emulating VMWare to emulate Linux running
old Amiga software. The system was extremely slow, but it worked.
Brief History Of Linux (#21)
The GNU Project

Meet Richard M. Stallman, an MIT hacker who would found the GNU Project
and create Emacs, the operating-system-disguised-as-a-text-editor. RMS,
the first member of the Three Initials Club (joined by ESR and JWZ),
experienced such frustration with software wrapped in arcane license
agreements that he embarked on the GNU Project to produce free software.

His journey began when he noticed this fine print for a printer driver:

   You do not own this software. You own a license to use one copy of this
   software, a license that we can revoke at any time for any reason
   whatsoever without a refund. You may not copy, distribute, alter,
   disassemble, or hack the software. The source code is locked away in a
   vault in Cleveland. If you say anything negative about this software
   you will be in violation of this license and required to forfeit your
   soul and/or first born child to us.

The harsh wording of the license shocked RMS. The computer industry was in
it's infancy, which could only mean it was going to get much, much worse.
Brief History Of Linux (#23)

Linus Torvalds certainly wasn't the only person to create their own
operating system from scratch. Other people working from their leaky
basements did create their own systems and now they are sick that they
didn't become an Alpha Geek like Torvalds or a Beta Geek like Alan Cox.

Linus had one advantage not many else did: Internet access. The world was
full of half-implemented-Unix-kernels at the time, but they were sitting
isolated on some hacker's hard drive, destined to be destroyed by a hard
drive crash. Thankfully that never happened to Linux, mostly because
everyone with Net access could download a copy instead of paying shipping
charges to receive the code on a huge stack of unreliable floppy disks.

Indeed, buried deep within a landfill in Lansing, Michigan sits a stack of
still-readable 5-1/4 floppies containing the only known copy of "Windows
Killer", a fully functional Unix kernel so elegant, so efficient, so
easy-to-use that Ken Thompson himself would be jealous of its design.
Unfortunately the author's mother threw out the stack of floppies in a
bout of spring cleaning. The 14 year old author's talents were lost
forever as his parents sent him to Law School.
Brief History Of Linux (#25)

By the mid-1990's the Linux community was burgeoning as countless geeks
fled Redmond monopolistic oppression, Armonk cluelessness, and Cupertino
click-and-drool reality distortion fields. By late 1991 there was an
informal Linux User Group in Finland, although its primary focus was Linux
advocacy, not drinking beer and telling Microsoft jokes as most do today.

Kernel development continued at a steady clip, with more and more people
joining in and hoping that their patches would be accepted by the
Benevolent Dictator himself. To have a patch accepted by Linus was like
winning the Nobel Prize, but to face rejection was like being rejected
from Clown College. The reputation game certainly sparked some flame wars.

One of the most memorable crisis was over the behavior of the delete and
backspace keys. A certain faction of hackers wanted the Backspace key to
actually backspace and the Delete key to actually delete. Linus wasn't too
keen on the proposed changes; "It Works For Me(tm)" is all he said. Some
observers now think Linus was pulling rank to get back at the unknown
hacker who managed to slip a patch by him that replaced the "Kernel panic"
error with "Kernel panic: Linus probably fscked it all up again".
"Brown Orifice" Is Only The Beginning

Last week security holes were found in Netscape's Java implementation that
allowed it to act as a web server. Earlier today, a hacker announced that
he had found vulnerabilities in Mozilla M17 that allow it to operate as a
web browser. And that's just the beginning.

Said "3l337h4x0r", the discoverer of the M17 exploit, "This is quite a
hack! By manipulating some internal functions, I was able to use M17 to
actually surf the web. Slashdot and Humorix rendered beautifully."

Mozilla engineers were stunned. "This shouldn't be possible. M17 contains
a newsreader, a mail client, an instant messenger client, and a whole
bunch of XUL acronymn-enriched stuff, but it shouldn't be able to handle
HTTP or HTML. We haven't been planning on adding web-surfing functionality
to Mozilla until M30... maybe M25 at the earliest. I suspect this whole
thing is a hoax."
Microsoft Fights Linux -- By Contributing Kernel Patches

If you can't beat 'em, join 'em... and then destory 'em. That seems to be the
new Microsoft strategy for dealing with Linux. Instead of fighting a FUD or
patent war, Microsoft operatives are doing something totally out of character:
they are contributing patches for the Linux kernel and other programs.

Don't worry, Microsoft is still evil. It's all part of a massive denial of
service attack against Linus Torvalds designed to bring kernel development to
a standstill. By sending over 10,000 patches per minute by email to Linus and
other top kernel hackers, Microsoft has exposed Linux's Achilles heel.

"I can't believe this is happening!" one stressed-out kernel hacker said at a
press conference on IRC. "If this goes on, we may have to conduct kernel
development over some other network protocol, like avian carriers... Aw crap,
there's smoke coming from my email server! Ahh... it can't handle the load!"
At this point the developer cut off and we haven't heard from him since.

At first Linus was unsure where the deluge of patches was coming from. But
when he saw one patch to replace kernel panics with bluescreens, the source
was pretty obvious. "Oh, and the fact that all of the patches are covered by
Microsoft's GPL [Grossly Private License] was a dead giveaway, too,"
"Linux kernel development is dominated by a hacker ethos, in which
external documentation is held in contempt, and even code comments
are viewed with suspicion."

         - Jerry Epplin
In personal conversations with technical people, I call myself a hacker. But
when I'm talking to journalists I just say "programmer" or something like that.

        - Linus Torvalds
Russell King wrote:
> I'll look into it, produce a patch, but I'm not a VM hacker.

You know what a pte is so you're a VM hacker ;-)

        - Daniel Phillips on linux-kernel
<netgod> my client has been owned severely
<netgod> this guy got root, ran packet sniffers, installed .rhosts and
         backdoors, put a whole new dir in called /lib/"   ", which has a
         full suite of smurfing and killing tools
<netgod> the only mistake was not deleting the logfiles
<netgod> question is how was root hacked, and that i couldnt tell u
<netgod> it is, of course, not a debian box
* netgod notes the debian box is the only one left untouched by the hacker
         -- wonder why
AP/STT.  Helsinki, Dec 5th, 6:22 AM.  For immediate release.

In order to allay fears about the continuity of the Linux project, Linus
Torvalds together with his manager Tove Monni have released "Linus
v2.0", affectionately known as "Kernel Hacker - The Next Generation".

Linux stock prices on Wall Street rose sharply after the announcement;
as one well-known analyst who wishes to remain anonymous says - "It
shows a long-term commitment, and while we expect a short-term decrease
in productivity, we feel that this solidifies the development in the
long run".

Other analysts downplay the importance of the event, and claim that just
about anybody could have done it.  "I'm glad somebody finally told them
about the birds and the bees" one sceptic comments cryptically.  But
even the skeptics agree that it is an interesting turn of events.

Others bring up other issues with the new version - "I'm especially
intrigued by the fact that the new version is female, and look forward
to seeing what the impact of that will be on future development.  Will
"Red Hat Linux" change to "Pink Hat Linux", for example?"
        -- Linus Torvalds announcing that he became father of a girl
As to house maintenance, does it involve problem solfing?  If so,
your hacker can safely be left to deall with the panning (for the
musement value, if nothering ese).
        -- Telsa Gwynne
Boss: You forgot to assign the result of your map!

Hacker: Dang, I'm always forgetting my assignations...

Boss: And what's that "goto" doing there?!?

Hacker: Er, I guess my finger slipped when I was typing "getservbyport"...

Boss: Ah well, accidents will happen.  Maybe we should have picked APL.
             -- Larry Wall in <199710311732.JAA19169@wall.org>
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners