Proverbs, aphorisms, quotations (English) | by Linux fortune |
The Great Movie Posters: The nightmare terror of the slithering eye that unleashed agonizing horror on a screaming world! -- The Crawling Eye (1958) SEE a female colossus... her mountainous torso, scyscraper limbs, giant desires! -- Attack of the Fifty-Foot Woman (1958) Here Is Your Chance To Know More About Sex. What Should a Movie Do? Hide Its Head in the Sand Like an Ostrich? Or Face the JOLTING TRUTH as does... -- The Desperate Women (1958) | |
If you have received a letter inviting you to speak at the dedication of a new cat hospital, and you hate cats, your reply, declining the invitation, does not necessarily have to cover the full range of your emotions. You must make it clear that you will not attend, but you do not have to let fly at cats. The writer of the letter asked a civil question; attack cats, then, only if you can do so with good humor, good taste, and in such a way that your answer will be courteous as well as responsive. Since you are out of sympathy with cats, you may quite properly give this as a reason for not appearing at the dedication ceremonies of a cat hospital. But bear in mind that your opinion of cats was not sought, only your services as a speaker. Try to keep things straight. -- Strunk and White, "The Elements of Style" | |
virus attack, luser responsible | |
Small animal kamikaze attack on power supplies | |
Courage is resistance to fear, mastery of fear--not absence of fear. Except a creature be part coward it is not a compliment to say it is brave; it is merely a loose misapplication of the word. Consider the flea!--incomparably the bravest of all the creatures of God, if ignorance of fear were courage. Whether you are asleep or awake he will attack you, caring nothing for the fact that in bulk and strength you are to him as are the massed armies of the earth to a sucking child; he lives both day and night and all days and nights in the very lap of peril and the immediate presence of death, and yet is no more afraid than is the man who walks the streets of a city that was threatened by an earthquake ten centuries before. When we speak of Clive, Nelson, and Putnam as men who "didn't know what fear was," we ought always to add the flea--and put him at the head of the procession. -- Mark Twain, "Pudd'nhead Wilson's Calendar" | |
NOTE: No warranties, either express or implied, are hereby given. All software is supplied as is, without guarantee. The user assumes all responsibility for damages resulting from the use of these features, including, but not limited to, frustration, disgust, system abends, disk head-crashes, general malfeasance, floods, fires, shark attack, nerve gas, locust infestation, cyclones, hurricanes, tsunamis, local electromagnetic disruptions, hydraulic brake system failure, invasion, hashing collisions, normal wear and tear of friction surfaces, comic radiation, inadvertent destruction of sensitive electronic components, windstorms, the Riders of Nazgul, infuriated chickens, malfunctioning mechanical or electrical sexual devices, premature activation of the distant early warning system, peasant uprisings, halitosis, artillery bombardment, explosions, cave-ins, and/or frogs falling from the sky. | |
Overall, the philosophy is to attack the availability problem from two complementary directions: to reduce the number of software errors through rigorous testing of running systems, and to reduce the effect of the remaining errors by providing for recovery from them. An interesting footnote to this design is that now a system failure can usually be considered to be the result of two program errors: the first, in the program that started the problem; the second, in the recovery routine that could not protect the system. -- A.L. Scherr, "Functional Structure of IBM Virtual Storage Operating Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal, Vol. 12, No. 4. | |
This is where the bloodthirsty license agreement is supposed to go, explaining that Interactive Easyflow is a copyrighted package licensed for use by a single person, and sternly warning you not to pirate copies of it and explaining, in detail, the gory consequences if you do. We know that you are an honest person, and are not going to go around pirating copies of Interactive Easyflow; this is just as well with us since we worked hard to perfect it and selling copies of it is our only method of making anything out of all the hard work. If, on the other hand, you are one of those few people who do go around pirating copies of software you probably aren't going to pay much attention to a license agreement, bloodthirsty or not. Just keep your doors locked and look out for the HavenTree attack shark. -- License Agreement for Interactive Easyflow | |
We don't claim Interactive EasyFlow is good for anything -- if you think it is, great, but it's up to you to decide. If Interactive EasyFlow doesn't work: tough. If you lose a million because Interactive EasyFlow messes up, it's you that's out the million, not us. If you don't like this disclaimer: tough. We reserve the right to do the absolute minimum provided by law, up to and including nothing. This is basically the same disclaimer that comes with all software packages, but ours is in plain English and theirs is in legalese. We didn't really want to include any disclaimer at all, but our lawyers insisted. We tried to ignore them but they threatened us with the attack shark at which point we relented. -- Haven Tree Software Limited, "Interactive EasyFlow" | |
It is important to note that probably no large operating system using current design technology can withstand a determined and well-coordinated attack, and that most such documented penetrations have been remarkably easy. -- B. Hebbard, "A Penetration Analysis of the Michigan Terminal System", Operating Systems Review, Vol. 14, No. 1, June 1980, pp. 7-20 | |
Overall, the philosophy is to attack the availability problem from two complementary directions: to reduce the number of software errors through rigorous testing of running systems, and to reduce the effect of the remaining errors by providing for recovery from them. An interesting footnote to this design is that now a system failure can usually be considered to be the result of two program errors: the first, in the program that started the problem; the second, in the recovery routine that could not protect the system. -- A. L. Scherr, "Functional Structure of IBM Virtual Storage Operating Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal, Vol. 12, No. 4, 1973, pp. 382-400 | |
...And no philosophy, sadly, has all the answers. No matter how assured we may be about certain aspects of our belief, there are always painful inconsistencies, exceptions, and contradictions. This is true in religion as it is in politics, and is self-evident to all except fanatics and the naive. As for the fanatics, whose number is legion in our own time, we might be advised to leave them to heaven. They will not, unfortunately, do us the same courtesy. They attack us and each other, and whatever their protestations to peaceful intent, the bloody record of history makes clear that they are easily disposed to restore to the sword. My own belief in God, then, is just that -- a matter of belief, not knowledge. My respect for Jesus Christ arises from the fact that He seems to have been the most virtuous inhabitant of Planet Earth. But even well-educated Christians are frustated in their thirst for certainty about the beloved figure of Jesus because of the undeniable ambiguity of the scriptural record. Such ambiguity is not apparent to children or fanatics, but every recognized Bible scholar is perfectly aware of it. Some Christians, alas, resort to formal lying to obscure such reality. - Steve Allen, comdeian, from an essay in the book "The Courage of Conviction", edited by Philip Berman | |
What to do in case of an alien attack: 1) Hide beneath the seat of your plane and look away. 2) Avoid eye contact. 3) If there are no eyes, avoid all contact. -- The Firesign Theatre, _Everything you know is Wrong_ | |
"Remember Kruschev: he tried to do too many things too fast, and he was removed in disgrace. If Gorbachev tries to destroy the system or make too many fundamental changes to it, I believe the system will get rid of him. I am not a political scientist, but I understand the system very well. I believe he will have a "heart attack" or retire or be removed. He is up against a brick wall. If you think they will change everything and become a free, open society, forget it!" -- Victor Belenko, MiG-25 fighter pilot who defected in 1976 "Defense Electronics", Vol 20, No. 6, pg. 110 | |
If we suffer tamely a lawless attack upon our liberty, we encourage it, and involve others in our doom. -- Samuel Adams | |
In case of atomic attack, the federal ruling against prayer in schools will be temporarily canceled. | |
It is impossible to defend perfectly against the attack of those who want to die. | |
"Nuclear war would mean abolition of most comforts, and disruption of normal routines, for children and adults alike." -- Willard F. Libby, "You *Can* Survive Atomic Attack" | |
The introduction of a new kind of music must be shunned as imperiling the whole state, for styles of music are never disturbed without affecting the most important political institutions. ... The new style, gradually gaining a lodgement, quitely insinuates itself into manners and customs, and from it ... goes on to attack laws and constitutions, displaying the utmost impudence, until it ends by overturning everything. -- Plato, "Republic", 370 B.C. | |
Fortune's Rules for Memo Wars: #2 Given the incredible advances in sociocybernetics and telepsychology over the last few years, we are now able to completely understand everything that the author of an memo is trying to say. Thanks to modern developments in electrocommunications like notes, vnews, and electricity, we have an incredible level of interunderstanding the likes of which civilization has never known. Thus, the possibility of your misinterpreting someone else's memo is practically nil. Knowing this, anyone who accuses you of having done so is a liar, and should be treated accordingly. If you *do* understand the memo in question, but have absolutely nothing of substance to say, then you have an excellent opportunity for a vicious ad hominem attack. In fact, the only *inappropriate* times for an ad hominem attack are as follows: 1: When you agree completely with the author of an memo. 2: When the author of the original memo is much bigger than you are. 3: When replying to one of your own memos. | |
TCP/IP Slang Glossary, #1: Gong, n: Medieval term for privy, or what pased for them in that era. Today used whimsically to describe the aftermath of a bogon attack. Think of our community as the Galapagos of the English language. "Vogons may read you bad poetry, but bogons make you study obsolete RFCs." -- Dave Mills | |
Never drink coke in a moving elevator. The elevator's motion coupled with the chemicals in coke produce hallucinations. People tend to change into lizards and attack without warning, and large bats usually fly in the window. Additionally, you begin to believe that elevators have windows. | |
The carbonyl is polarized, The delta end is plus. The nucleophile will thus attack, The carbon nucleus. Addition makes an alcohol, Of types there are but three. It makes a bond, to correspond, From C to shining C. -- Prof. Frank Westheimer, to "America the Beautiful" | |
While you recently had your problems on the run, they've regrouped and are making another attack. | |
Klingon phaser attack from front!!!!! 100% Damage to life support!!!! | |
Spock: The odds of surviving another attack are 13562190123 to 1, Captain. | |
Spock: We suffered 23 casualties in that attack, Captain. | |
You are an excellent tactician, Captain. You let your second in command attack while you sit and watch for weakness. -- Khan Noonian Singh, "Space Seed", stardate 3141.9 | |
Operation Desert Slash WASHINGTON, D.C. -- High officials in the US military are planning on putting the 'Slashdot Effect' to use against Iraq. Pentagon computer experts think that the Slashdot Effect could topple key Net-connected Iraqi computer systems. Such a Denial of Service attack could prove instrumental when the US invades. One Pentagon official said, "If I had a million dollars for every server that crashed as a result of being linked on Slashdot, I'd be richer than Bill Gates. The Slashdot Effect is a very powerful weapon that the US military wants to tap into." Rob Malda has been contacted by top military brass. According to anonymous sources, Malda will play a key part in the so-called "Operation Desert Slash". Supposedly Malda will post several Slashdot articles with links to critical Iraqi websites right when the US invasion is set to begin. Meanwhile, Pentagon operatives will begin a series of Denial of Service attacks on other key Iraqi computer systems. One source notes, "Since many Iraqi systems rely on Microsoft software, this task should be relatively simple." | |
Attack of the Tuxissa Virus What started out as a prank posting to comp.os.linux.advocacy yesterday has turned into one of the most significant viruses in computing history. The creator of the virus, who goes by the moniker "Anonymous Longhair", modified the Melissa virus to install Linux on infected machines. "It's a work of art," one Linux advocate told Humorix after he looked through the Tuxissa virus source code. "This virus goes well beyond the feeble troublemaking of Melissa. It actually configures a UMSDOS partition on the user's hard drive and then downloads and installs a stripped-down version of Slackware Linux." The email message that the virus is attached to has the subject "Important Message About Windows Security". The text of the body says, "I want to let you know about some security problems I've uncovered in Windows 95/98/NT, Office 95/97, and Outlook. It's critically important that you protect your system against these attacks. Visit these sites for more information..." The rest of the message contains 42 links to sites about Linux and free software. Details on how the virus started are a bit sketchy. The "Anonymous Longhair" who created it only posted it to Usenet as an early April Fool's gag, demonstrating how easy it would be to mount a "Linux revolution". | |
The War Against Linux A significant obstacle on the path to Linux World Domination has emerged. A reactionary grass-roots movement has formed to fight, as they call it, "The War Against Linux". This movement, code-named "LinSux", is composed of people (mostly Microsoft stockholders and commercial software developers) who want to maintain the status quo. They are fighting back against the rise of Linux and free software which they see as a threat to their financial independence. The most damaging attack the LinSux folks have launched is "Three Mile Island", a Windows macro virus designed to inflict damage on computers that contain a partition devoted to a non-Microsoft OS. When the victim computer is booted into Windows, the virus activates and deletes any non-Microsoft partitions. Ironically, the many security flaws in Windows allow the virus to damage alternative operating systems but leave Windows unscathed. "The War Against Linux" has also been fought in more subtle ways. Time-tested methods of Linux advocacy have been turned into subtle forms of anti-Linux advocacy by the LinSux crowd. MSCEs are smuggling NT boxes into companies that predominantly use Linux or Unix. LinSux "freedom fighters" are rearranging books and software boxes on store shelves so that Microsoft offerings are displayed more prominently. | |
Jargon Coiner (#12) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * IPO (I've Patented the Obvious): Acquiring patents on trivial things and then hitting other companies over the head with them. Example: "Amazon just IPO'd one-click spam and is now ready to sue B&N." * IPO (I'm Pissed Off): Exclamation given by a Linux user who was unable to participate in a highly lucrative Linux IPO due to lack of capital or E*Trade problems. Also uttered by Linux hackers who did not receive The Letter from Red Hat or VA Linux even though their friends did. * YAKBA (Yet Another Killer Backhoe Attack): The acronym that describes network outtages caused by a careless backhoe operator. Examples: "Don't blame us, our website was offline after we suffered a YAKBA". "Don't worry about Y2K, what we need to think about is YAKBA-compliance." | |
Microsoft Fights Linux -- By Contributing Kernel Patches If you can't beat 'em, join 'em... and then destory 'em. That seems to be the new Microsoft strategy for dealing with Linux. Instead of fighting a FUD or patent war, Microsoft operatives are doing something totally out of character: they are contributing patches for the Linux kernel and other programs. Don't worry, Microsoft is still evil. It's all part of a massive denial of service attack against Linus Torvalds designed to bring kernel development to a standstill. By sending over 10,000 patches per minute by email to Linus and other top kernel hackers, Microsoft has exposed Linux's Achilles heel. "I can't believe this is happening!" one stressed-out kernel hacker said at a press conference on IRC. "If this goes on, we may have to conduct kernel development over some other network protocol, like avian carriers... Aw crap, there's smoke coming from my email server! Ahh... it can't handle the load!" At this point the developer cut off and we haven't heard from him since. At first Linus was unsure where the deluge of patches was coming from. But when he saw one patch to replace kernel panics with bluescreens, the source was pretty obvious. "Oh, and the fact that all of the patches are covered by Microsoft's GPL [Grossly Private License] was a dead giveaway, too," | |
In case of atomic attack, all work rules will be temporarily suspended. | |
We don't believe in rheumatism and true love until after the first attack. -- Marie Ebner von Eschenbach | |
At the hospital, a doctor is training an intern on how to announce bad news to the patients. The doctor tells the intern "This man in 305 is going to die in six months. Go in and tell him." The intern boldly walks into the room, over to the man's bedisde and tells him "Seems like you're gonna die!" The man has a heart attack and is rushed into surgery on the spot. The doctor grabs the intern and screams at him, "What!?!? are you some kind of moron? You've got to take it easy, work your way up to the subject. Now this man in 213 has about a week to live. Go in and tell him, but, gently, you hear me, gently!" The intern goes softly into the room, humming to himself, cheerily opens the drapes to let the sun in, walks over to the man's bedside, fluffs his pillow and wishes him a "Good morning!" "Wonderful day, no? Say... guess who's going to die soon!" |