DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

TCP/IP UDP alarm threshold is set too low.
Someone else stole your IP address, call the Internet detectives!
network down, IP packets delivered via UPS
"Our attitude with TCP/IP is, `Hey, we'll do it, but don't make a big
system, because we can't fix it if it breaks -- nobody can.'"

"TCP/IP is OK if you've got a little informal club, and it doesn't make
any difference if it takes a while to fix it."
                -- Ken Olson, in Digital News, 1988
TCP/IP Slang Glossary, #1:

Gong, n: Medieval term for privy, or what pased for them in that era.
Today used whimsically to describe the aftermath of a bogon attack. Think
of our community as the Galapagos of the English language.

"Vogons may read you bad poetry, but bogons make you study obsolete RFCs."
                -- Dave Mills
Humorix Holiday Gift Idea #5

AbsoluteZero(tm) Cryogenic Refrigerator
$29,999.95 for economy model at Cryo-Me-A-River, Inc.

The pundits have been hyping new technology allowing your home appliances to
have Internet access. Most people aren't too keen with the thought of their
refrigerator sharing an IP address with their can opener.

But with the new AbsoluteZero(tm) Refrigerator, that might change. This is not
a fridge for your food -- it's a fridge for your overclocked, overheating CPU.
You stick your computer inside, bolt the door shut, turn the temperature down
to 5 degrees Kelvin, and you've got the perfect environment for accelerating
your CPU to 1 Terahertz or more.

This cryogenic cooling system may not actually reach absolute zero, but it
comes mighty close. Unfortunately, the AbsoluteZero(tm) is the size of a small
house, consumes a constant stream of liquid nitrogen, and requires it's own
nuclear reactor (not included). But that's a small price to pay for the
ability to play Quake 3 at 100,000 frames per second.
World Domination, One CPU Cycle At A Time

Forget about searching for alien signals or prime numbers. The real
distributed computing application is "Domination@World", a program to advocate
Linux and Apache to every website in the world that uses Windows and IIS.

The goal of the project is to probe every IP number to determine what kind of
platform each Net-connected machine is running. "That's a tall order... we
need lots of computers running our Domination@World clients to help probe
every nook and cranny of the Net," explained Mr. Zell Litt, the project head.

After the probing is complete, the second phase calls for the data to be
cross-referenced with the InterNIC whois database. "This way we'll have the
names, addresses, and phone numbers for every Windows-using system
administrator on the planet," Zell gloated. "That's when the fun begins."

The "fun" part involves LART (Linux Advocacy & Re-education Training), a plan
for extreme advocacy. As part of LART, each Linux User Group will receive a
list of the Windows-using weenies in their region. The LUG will then be able
to employ various advocacy techniques, ranging from a soft-sell approach
(sending the target a free Linux CD in the mail) all the way to "LARTcon 5"
(cracking into their system and forcibly installing Linux).
The Humorix Oracle explains how to get a job at a major corporation:

1. Find an exploit in Microsoft IIS or another buggy Microsoft product to
   which large corporations rarely apply security patches.
2. Create a virus or worm that takes advantage of this exploit and then
   propogates itself by selecting IP numbers at random and then trying to
   infect those machines.
3. Keep an eye on your own website's server logs. When your virus starts
   propogating, your server will be hit with thousands of attacks from
   other infected systems trying to spread the virus to your machine.
4. Make a list of the IP numbers of all of the infected machines.
5. Perform a reverse DNS lookup on these IP numbers.
6. Make a note of all of the Fortune 500 companies that appear on the list
   of infected domains.
7. Send your resume to these companies and request an interview for a
   system administrator position. These companies are hiring -- whether
   they realize it or not.
8. Use your new salary to hire a good defense lawyer when the FBI comes
   knocking.
I believe the Committee for the Preservation of Welsh Poetry are pretty
settled on the -ac tree. Aren't they doing an audio CD of Alan reciting
the TCP/IP stack sources?

        - Rich Hohensee on linux-kernel
<Culus> Saens demonstrates no less than 3 tcp/ip bugs in 2.2.3
Win 95 is simplified for the user:

User: What does this configuration thing do?
You: It allows you to modify you settings, for networking,
        hardware, protocols, ...
User: Whoa! Layman's terms, please!
You:  It changes stuff.
User: That's what I'm looking for!  What can it change?
You:  This part change IP forwarding.  It allows ...
User: Simplify, simplify!  What can it do for ME?
You:  Nothing, until you understand it.
User: Well it makes me uncomfortable.  It looks so technical;
      Get rid of it, I want a system *I* can understand.
You:  But...
User: Hey, who's system is this anyway?
You:  (... rm this, rm that, rm /etc/* ...) "All done."
        -- Kevin M. Bealer <kmb203@psu.edu>
<lilo> Fairlight: udp is the light margarine of tcp/ip transport protocols :)
        -- Seen on #Linux
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners