Proverbs, aphorisms, quotations (English) | by Linux fortune |
In arguing that current theories of brain function cast suspicion on ESP, psychokinesis, reincarnation, and so on, I am frequently challenged with the most popular of all neuro-mythologies -- the notion that we ordinarily use only 10 percent of our brains... This "cerebral spare tire" concept continues to nourish the clientele of "pop psychologists" and their many recycling self-improvement schemes. As a metaphor for the fact that few of us fully exploit our talents, who could deny it? As a refuge for occultists seeking a neural basis of the miraculous, it leaves much to be desired. -- Barry L. Beyerstein, "The Brain and Consciousness: Implications for Psi Phenomena", The Skeptical Enquirer, Vol. XII, No. 2, pg. 171 | |
MAKE MONEY FAST FROM SLASHDOT!!!!!! You are probably familiar with the Slashdot.org "News for Nerds" site. You've probably heard about the "Slashdot Effect". Now, we want to introduce a new term that could change your life: "Slashdot Baiting". The Slashdot Effect is a significant source of traffic. Lots of traffic. Thousands of visitors within hours. Thousands of eyeballs looking and clicking at YOUR banner advertisements. In short, the Slashdot Effect, if properly utilized, can produce a significant amount of advertising revenue. That's where we at MoneyDot Lucrative Marketing International Group, Inc. come in. We know how to exploit the Slashdot Effect. We call our strategy "Slashdot Baiting". It's quite painless. We have formulated 101 easy ways to get your site mentioned on Slashdot. Interested in pursuing Slashdot Baiting and obtaining financial independence? Want to make $50,000 (or more!) within 90 days? Then purchase MLM's "Slashdot Baiting Kit", which will contain everything you need to know to put this powerful marketing force to work for YOU! We also throw in a warranty: if your site isn't mentioned on Slashdot within 90 days of using this Kit, we'll give you your money back guaranteed! | |
"Brown Orifice" Is Only The Beginning Last week security holes were found in Netscape's Java implementation that allowed it to act as a web server. Earlier today, a hacker announced that he had found vulnerabilities in Mozilla M17 that allow it to operate as a web browser. And that's just the beginning. Said "3l337h4x0r", the discoverer of the M17 exploit, "This is quite a hack! By manipulating some internal functions, I was able to use M17 to actually surf the web. Slashdot and Humorix rendered beautifully." Mozilla engineers were stunned. "This shouldn't be possible. M17 contains a newsreader, a mail client, an instant messenger client, and a whole bunch of XUL acronymn-enriched stuff, but it shouldn't be able to handle HTTP or HTML. We haven't been planning on adding web-surfing functionality to Mozilla until M30... maybe M25 at the earliest. I suspect this whole thing is a hoax." | |
Look Out! It's Microsoft Outlook An old maxim in the Unix community states, "All programs expand until they can read mail... except Microsoft Outlook." Well, that's no longer true. By taking advantage of loopholes in several undocumented APIs, a team of geeks were able to transform Outlook from a virus-delivery system into an actual mail client. "It was quite a feat to accomplish this," said one of the geeks. "I mean, the rat's nest that is the Windows API can be used to frighten small children... or adults. And the frequency by which Outlook exploits are discovered is directly proportional to the number of times Bill Gates uses the word 'innovation'. But this is the first time somebody has discovered a beneficial exploit." Microsoft has vowed to release a patch to fix the uncovered security flaws. "We simply cannot tolerate unauthorized reverse engineering and hacking of our innovative solutions. Our Security Response Team will pull an all-nighter to eliminate these known issues." | |
The Humorix Oracle explains how to get a job at a major corporation: 1. Find an exploit in Microsoft IIS or another buggy Microsoft product to which large corporations rarely apply security patches. 2. Create a virus or worm that takes advantage of this exploit and then propogates itself by selecting IP numbers at random and then trying to infect those machines. 3. Keep an eye on your own website's server logs. When your virus starts propogating, your server will be hit with thousands of attacks from other infected systems trying to spread the virus to your machine. 4. Make a list of the IP numbers of all of the infected machines. 5. Perform a reverse DNS lookup on these IP numbers. 6. Make a note of all of the Fortune 500 companies that appear on the list of infected domains. 7. Send your resume to these companies and request an interview for a system administrator position. These companies are hiring -- whether they realize it or not. 8. Use your new salary to hire a good defense lawyer when the FBI comes knocking. |