DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
attack
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

The Great Movie Posters:

The nightmare terror of the slithering eye that unleashed agonizing
horror on a screaming world!
                -- The Crawling Eye (1958)

SEE a female colossus... her mountainous torso, scyscraper limbs,
giant desires!
                -- Attack of the Fifty-Foot Woman (1958)

Here Is Your Chance To Know More About Sex.
What Should a Movie Do?  Hide Its Head in the Sand Like an Ostrich?
Or Face the JOLTING TRUTH as does...
                -- The Desperate Women (1958)
If you have received a letter inviting you to speak at the dedication of a
new cat hospital, and you hate cats, your reply, declining the invitation,
does not necessarily have to cover the full range of your emotions.  You must
make it clear that you will not attend, but you do not have to let fly at cats.
The writer of the letter asked a civil question; attack cats, then, only if
you can do so with good humor, good taste, and in such a way that your answer
will be courteous as well as responsive.  Since you are out of sympathy with
cats, you may quite properly give this as a reason for not appearing at the
dedication ceremonies of a cat hospital.  But bear in mind that your opinion
of cats was not sought, only your services as a speaker.  Try to keep things
straight.
                -- Strunk and White, "The Elements of Style"
virus attack, luser responsible
Small animal kamikaze attack on power supplies
Courage is resistance to fear, mastery of fear--not absence of fear.  Except a
creature be part coward it is not a compliment to say it is brave; it is merely
a loose misapplication of the word.  Consider the flea!--incomparably the
bravest of all the creatures of God, if ignorance of fear were courage.
Whether you are asleep or awake he will attack you, caring nothing for the fact
that in bulk and strength you are to him as are the massed armies of the earth
to a sucking child; he lives both day and night and all days and nights in the
very lap of peril and the immediate presence of death, and yet is no more
afraid than is the man who walks the streets of a city that was threatened by
an earthquake ten centuries before.  When we speak of Clive, Nelson, and Putnam
as men who "didn't know what fear was," we ought always to add the flea--and
put him at the head of the procession.
                -- Mark Twain, "Pudd'nhead Wilson's Calendar"
NOTE: No warranties, either express or implied, are hereby given. All
software is supplied as is, without guarantee.  The user assumes all
responsibility for damages resulting from the use of these features,
including, but not limited to, frustration, disgust, system abends, disk
head-crashes, general malfeasance, floods, fires, shark attack, nerve
gas, locust infestation, cyclones, hurricanes, tsunamis, local
electromagnetic disruptions, hydraulic brake system failure, invasion,
hashing collisions, normal wear and tear of friction surfaces, comic
radiation, inadvertent destruction of sensitive electronic components,
windstorms, the Riders of Nazgul, infuriated chickens, malfunctioning
mechanical or electrical sexual devices, premature activation of the
distant early warning system, peasant uprisings, halitosis, artillery
bombardment, explosions, cave-ins, and/or frogs falling from the sky.
Overall, the philosophy is to attack the availability problem from two
complementary directions:  to reduce the number of software errors through
rigorous testing of running systems, and to reduce the effect of the remaining
errors by providing for recovery from them.  An interesting footnote to this
design is that now a system failure can usually be considered to be the
result of two program errors:  the first, in the program that started the
problem; the second, in the recovery routine that could not protect the
system.
                -- A.L. Scherr, "Functional Structure of IBM Virtual Storage
                   Operating Systems, Part II: OS/VS-2 Concepts and
                   Philosophies," IBM Systems Journal, Vol. 12, No. 4.
        This is where the bloodthirsty license agreement is supposed to go,
explaining that Interactive Easyflow is a copyrighted package licensed for
use by a single person, and sternly warning you not to pirate copies of it
and explaining, in detail, the gory consequences if you do.
        We know that you are an honest person, and are not going to go around
pirating copies of Interactive Easyflow; this is just as well with us since
we worked hard to perfect it and selling copies of it is our only method of
making anything out of all the hard work.
        If, on the other hand, you are one of those few people who do go
around pirating copies of software you probably aren't going to pay much
attention to a license agreement, bloodthirsty or not.  Just keep your doors
locked and look out for the HavenTree attack shark.
                -- License Agreement for Interactive Easyflow
        We don't claim Interactive EasyFlow is good for anything -- if you
think it is, great, but it's up to you to decide.  If Interactive EasyFlow
doesn't work: tough.  If you lose a million because Interactive EasyFlow
messes up, it's you that's out the million, not us.  If you don't like this
disclaimer: tough.  We reserve the right to do the absolute minimum provided
by law, up to and including nothing.
        This is basically the same disclaimer that comes with all software
packages, but ours is in plain English and theirs is in legalese.
        We didn't really want to include any disclaimer at all, but our
lawyers insisted.  We tried to ignore them but they threatened us with the
attack shark at which point we relented.
                -- Haven Tree Software Limited, "Interactive EasyFlow"
It is important to note that probably no large operating system using current
design technology can withstand a determined and well-coordinated attack,
and that most such documented penetrations have been remarkably easy.
-- B. Hebbard, "A Penetration Analysis of the Michigan Terminal System",
Operating Systems Review, Vol. 14, No. 1, June 1980, pp. 7-20
Overall, the philosophy is to attack the availability problem from two
complementary directions:  to reduce the number of software errors through
rigorous testing of running systems, and to reduce the effect of the
remaining errors by providing for recovery from them.  An interesting footnote
to this design is that now a system failure can usually be considered to be
the result of two program errors:  the first, in the program that started the
problem; the second, in the recovery routine that could not protect the
system.  -- A. L. Scherr, "Functional Structure of IBM Virtual Storage Operating
Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal,
Vol. 12, No. 4, 1973, pp. 382-400
...And no philosophy, sadly, has all the answers.  No matter how assured
we may be about certain aspects of our belief, there are always painful
inconsistencies, exceptions, and contradictions.  This is true in religion as
it is in politics, and is self-evident to all except fanatics and the naive.
As for the fanatics, whose number is legion in our own time, we might be
advised to leave them to heaven.  They will not, unfortunately, do us the
same courtesy.  They attack us and each other, and whatever their
protestations to peaceful intent, the bloody record of history makes clear
that they are easily disposed to restore to the sword.  My own belief in
God, then, is just that -- a matter of belief, not knowledge.  My respect
for Jesus Christ arises from the fact that He seems to have been the
most virtuous inhabitant of Planet Earth.  But even well-educated Christians
are frustated in their thirst for certainty about the beloved figure
of Jesus because of the undeniable ambiguity of the scriptural record.
Such ambiguity is not apparent to children or fanatics, but every
recognized Bible scholar is perfectly aware of it.  Some Christians, alas,
resort to formal lying to obscure such reality.
- Steve Allen, comdeian, from an essay in the book "The Courage of
  Conviction", edited by Philip Berman
What to do in case of an alien attack:

    1)   Hide beneath the seat of your plane and look away.
    2)   Avoid eye contact.
    3) If there are no eyes, avoid all contact.

-- The Firesign Theatre, _Everything you know is Wrong_
"Remember Kruschev:  he tried to do too many things too fast, and he was
removed in disgrace.  If Gorbachev tries to destroy the system or make too
many fundamental changes to it, I believe the system will get rid of him.
I am not a political scientist, but I understand the system very well.
I believe he will have a "heart attack" or retire or be removed.  He is
up against a brick wall.  If you think they will change everything and
become a free, open society, forget it!"
-- Victor Belenko, MiG-25 fighter pilot who defected in 1976
   "Defense Electronics", Vol 20, No. 6, pg. 110
If we suffer tamely a lawless attack upon our liberty, we encourage it,
and involve others in our doom.
                -- Samuel Adams
In case of atomic attack, the federal ruling against prayer in schools
will be temporarily canceled.
It is impossible to defend perfectly against the attack of those who want
to die.
"Nuclear war would mean abolition of most comforts, and disruption of
normal routines, for children and adults alike."
                -- Willard F. Libby, "You *Can* Survive Atomic Attack"
The introduction of a new kind of music must be shunned as imperiling the
whole state, for styles of music are never disturbed without affecting
the most important political institutions. ...  The new style, gradually
gaining a lodgement, quitely insinuates itself into manners and customs,
and from it ... goes on to attack laws and constitutions, displaying the
utmost impudence, until it ends by overturning everything.
                -- Plato, "Republic", 370 B.C.
Fortune's Rules for Memo Wars: #2

Given the incredible advances in sociocybernetics and telepsychology over
the last few years, we are now able to completely understand everything that
the author of an memo is trying to say.  Thanks to modern developments
in electrocommunications like notes, vnews, and electricity, we have an
incredible level of interunderstanding the likes of which civilization has
never known.  Thus, the possibility of your misinterpreting someone else's
memo is practically nil.  Knowing this, anyone who accuses you of having
done so is a liar, and should be treated accordingly.  If you *do* understand
the memo in question, but have absolutely nothing of substance to say, then
you have an excellent opportunity for a vicious ad hominem attack.  In fact,
the only *inappropriate* times for an ad hominem attack are as follows:

        1: When you agree completely with the author of an memo.
        2: When the author of the original memo is much bigger than you are.
        3: When replying to one of your own memos.
TCP/IP Slang Glossary, #1:

Gong, n: Medieval term for privy, or what pased for them in that era.
Today used whimsically to describe the aftermath of a bogon attack. Think
of our community as the Galapagos of the English language.

"Vogons may read you bad poetry, but bogons make you study obsolete RFCs."
                -- Dave Mills
Never drink coke in a moving elevator.  The elevator's motion coupled with
the chemicals in coke produce hallucinations.  People tend to change into
lizards and attack without warning, and large bats usually fly in the
window.  Additionally, you begin to believe that elevators have windows.
The carbonyl is polarized,
The delta end is plus.
The nucleophile will thus attack,
The carbon nucleus.
Addition makes an alcohol,
Of types there are but three.
It makes a bond, to correspond,
From C to shining C.
                -- Prof. Frank Westheimer, to "America the Beautiful"
While you recently had your problems on the run, they've regrouped and
are making another attack.
Klingon phaser attack from front!!!!!
100% Damage to life support!!!!
Spock: The odds of surviving another attack are 13562190123 to 1, Captain.
Spock: We suffered 23 casualties in that attack, Captain.
You are an excellent tactician, Captain.  You let your second in
command attack while you sit and watch for weakness.
                -- Khan Noonian Singh, "Space Seed", stardate 3141.9
Operation Desert Slash

WASHINGTON, D.C. -- High officials in the US military are planning on putting
the  'Slashdot Effect' to use against Iraq. Pentagon computer experts think
that the Slashdot Effect could topple key Net-connected Iraqi computer
systems.  Such a Denial of Service attack could prove instrumental when the
US invades.

One Pentagon official said, "If I had a million dollars for every server that
crashed as a result of being linked on Slashdot, I'd be richer than Bill
Gates.  The Slashdot Effect is a very powerful weapon that the US military
wants to tap into."

Rob Malda has been contacted by top military brass.  According to anonymous
sources, Malda will play a key part in the so-called "Operation Desert
Slash".  Supposedly Malda will post several Slashdot articles with links to
critical Iraqi websites right when the US invasion is set to begin.
Meanwhile, Pentagon operatives will begin a series of Denial of Service
attacks on other key Iraqi computer systems. One source notes, "Since many
Iraqi systems rely on Microsoft software, this task should be relatively
simple."
Attack of the Tuxissa Virus

What started out as a prank posting to comp.os.linux.advocacy yesterday has
turned into one of the most significant viruses in computing history.
The creator of the virus, who goes by the moniker "Anonymous Longhair",
modified the Melissa virus to install Linux on infected machines.

"It's a work of art," one Linux advocate told Humorix after he looked
through the Tuxissa virus source code.  "This virus goes well beyond the
feeble troublemaking of Melissa.  It actually configures a UMSDOS partition
on the user's hard drive and then downloads and installs a stripped-down
version of Slackware Linux."

The email message that the virus is attached to has the subject "Important
Message About Windows Security".  The text of the body says, "I want to let
you know about some security problems I've uncovered in Windows 95/98/NT,
Office 95/97, and Outlook. It's critically important that you protect your
system against these attacks.  Visit these sites for more information..."
The rest of the message contains 42 links to sites about Linux and free
software.

Details on how the virus started are a bit sketchy.  The "Anonymous
Longhair" who created it only posted it to Usenet as an early April Fool's
gag, demonstrating how easy it would be to mount a "Linux revolution".
The War Against Linux

A significant obstacle on the path to Linux World Domination has emerged.  A
reactionary grass-roots movement has formed to fight, as they call it, "The
War Against Linux".  This movement, code-named "LinSux", is composed of
people (mostly Microsoft stockholders and commercial software developers)
who want to maintain the status quo.  They are fighting back against the
rise of Linux and free software which they see as a threat to their financial
independence.

The most damaging attack the LinSux folks have launched is "Three Mile
Island", a Windows macro virus designed to inflict damage on computers that
contain a partition devoted to a non-Microsoft OS.  When the victim computer
is booted into Windows, the virus activates and deletes any non-Microsoft
partitions. Ironically, the many security flaws in Windows allow the virus
to damage alternative operating systems but leave Windows unscathed.

"The War Against Linux" has also been fought in more subtle ways.
Time-tested methods of Linux advocacy have been turned into subtle forms of
anti-Linux advocacy by the LinSux crowd.  MSCEs are smuggling NT boxes into
companies that predominantly use Linux or Unix.  LinSux "freedom fighters"
are rearranging books and software boxes on store shelves so that Microsoft
offerings are displayed more prominently.
Jargon Coiner (#12)

An irregular feature that aims to give you advance warning of new jargon
that we've just made up.

* IPO (I've Patented the Obvious): Acquiring patents on trivial things and
  then hitting other companies over the head with them.

  Example: "Amazon just IPO'd one-click spam and is now ready to sue B&N."

* IPO (I'm Pissed Off): Exclamation given by a Linux user who was unable
  to participate in a highly lucrative Linux IPO due to lack of capital or
  E*Trade problems. Also uttered by Linux hackers who did not receive The
  Letter from Red Hat or VA Linux even though their friends did.
  
* YAKBA (Yet Another Killer Backhoe Attack): The acronym that describes
  network outtages caused by a careless backhoe operator.

  Examples: "Don't blame us, our website was offline after we suffered a
  YAKBA". "Don't worry about Y2K, what we need to think about is
  YAKBA-compliance."
Microsoft Fights Linux -- By Contributing Kernel Patches

If you can't beat 'em, join 'em... and then destory 'em. That seems to be the
new Microsoft strategy for dealing with Linux. Instead of fighting a FUD or
patent war, Microsoft operatives are doing something totally out of character:
they are contributing patches for the Linux kernel and other programs.

Don't worry, Microsoft is still evil. It's all part of a massive denial of
service attack against Linus Torvalds designed to bring kernel development to
a standstill. By sending over 10,000 patches per minute by email to Linus and
other top kernel hackers, Microsoft has exposed Linux's Achilles heel.

"I can't believe this is happening!" one stressed-out kernel hacker said at a
press conference on IRC. "If this goes on, we may have to conduct kernel
development over some other network protocol, like avian carriers... Aw crap,
there's smoke coming from my email server! Ahh... it can't handle the load!"
At this point the developer cut off and we haven't heard from him since.

At first Linus was unsure where the deluge of patches was coming from. But
when he saw one patch to replace kernel panics with bluescreens, the source
was pretty obvious. "Oh, and the fact that all of the patches are covered by
Microsoft's GPL [Grossly Private License] was a dead giveaway, too,"
In case of atomic attack, all work rules will be temporarily suspended.
We don't believe in rheumatism and true love until after the first attack.
                -- Marie Ebner von Eschenbach
At the hospital, a doctor is training an intern on how to announce bad news
to the patients.  The doctor tells the intern "This man in 305 is going to
die in six months.  Go in and tell him."  The intern boldly walks into the
room, over to the man's bedisde and tells him "Seems like you're gonna die!"
The man has a heart attack and is rushed into surgery on the spot.  The doctor
grabs the intern and screams at him, "What!?!? are you some kind of moron?
You've got to take it easy, work your way up to the subject.  Now this man in
213 has about a week to live.  Go in and tell him, but, gently, you hear me,
gently!"
        The intern goes softly into the room, humming to himself, cheerily
opens the drapes to let the sun in, walks over to the man's bedside, fluffs
his pillow and wishes him a "Good morning!"  "Wonderful day, no?  Say...
guess who's going to die soon!"
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners