DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
files
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

Hello.  Jim Rockford's machine, this is Larry Doheny's machine.  Will you
please have your master call my master at his convenience?  Thank you.
Thank you.  Thank you.  Thank you.  Thank you.  Thank you.
                -- "The Rockford Files"
Hi Jimbo.  Dennis.  Really appreciate the help on the income tax.  You wanna
help on the audit now?
                -- "The Rockford Files"
Jim, it's Grace at the bank.  I checked your Christmas Club account.
You don't have five-hundred dollars.  You have fifty.  Sorry, computer foul-up!
                -- "The Rockford Files"
Jim, it's Jack.  I'm at the airport.  I'm going to Tokyo and wanna pay
you the five-hundred I owe you.  Catch you next year when I get back!
                -- "The Rockford Files"
Jim, this is Janelle.  I'm flying tonight, so I can't make our date, and
I gotta find a safe place for Daffy.  He loves you, Jim!  It's only two
days, and you'll see.  Great Danes are no problem!
                -- "The Rockford Files"
Jim, this is Matty down at Ralph's and Mark's.  Some guy named Angel
Martin just ran up a fifty buck bar tab.  And now he wants to charge it
to you.  You gonna pay it?
                -- "The Rockford Files"
Mr. Rockford, this is the Thomas Crown School of Dance and Contemporary
Etiquette.  We aren't going to call again!  Now you want these free
lessons or what?
                -- "The Rockford Files"
Mr. Rockford?  Miss Collins from the Bureau of Licenses.  We got your
renewal before the extended deadline but not your check.  I'm sorry but
at midnight you're no longer licensed as an investigator.
                -- "The Rockford Files"
Mr. Rockford?  This is Betty Joe Withers.  I got four shirts of yours from
the Bo Peep Cleaners by mistake.  I don't know why they gave me men's
shirts but they're going back.
                -- "The Rockford Files"
Mr. Rockford?  You don't know me, but I'd like to hire you.  Could
you call me at...  My name is... uh...  Never mind, forget it!
                -- "The Rockford Files"
This is Jim Rockford.
At the tone leave your name and message; I'll get back to you.

This is Maria, Liberty Bail Bonds.  Your client, Todd Lieman, skipped and
his bail is forfeit.  That's the pink slip on your '74 Firebird, I believe.
Sorry, Jim, bring it on over.

This is Marilyn Reed, I wanta talk to you...  Is this a machine?  I don't
talk to machines!  [Click]
                -- "The Rockford Files"
This is the Baron.  Angel Martin tells me you buy information.  Ok,
meet me at one a.m. behind the bus depot, bring five-hundred dollars
and come alone.  I'm serious!
                -- "The Rockford Files"
Yeah, yo mama dresses you funny and you need a mouse to delete files.
50% of the manual is in .pdf readme files
Let him choose out of my files, his projects to accomplish.
                -- Shakespeare, "Coriolanus"
All your files have been destroyed (sorry).  Paul.
As part of an ongoing effort to keep you, the Fortune reader, abreast of
the valuable information the daily crosses the USENET, Fortune presents:

News articles that answer *your* questions, #1:

        Newsgroups: comp.sources.d
        Subject: how do I run C code received from sources
        Keywords: C sources
        Distribution: na

        I do not know how to run the C programs that are posted in the
        sources newsgroup.  I save the files, edit them to remove the
        headers, and change the mode so that they are executable, but I
        cannot get them to run.  (I have never written a C program before.)

        Must they be compiled?  With what compiler?  How do I do this?  If
        I compile them, is an object code file generated or must I generate
        it explicitly with the > character?  Is there something else that
        must be done?
HEAD CRASH!!  FILES LOST!!
Details at 11.
I came, I saw, I deleted all your files.
**** IMPORTANT ****  ALL USERS PLEASE NOTE ****

Due to a recent systems overload error your recent disk files have been
erased.  Therefore, in accordance with the UNIX Basic Manual, University of
Washington Geophysics Manual, and Bylaw 9(c), Section XII of the Revised
Federal Communications Act, you are being granted Temporary Disk Space,
valid for three months from this date, subject to the restrictions set forth
in Appendix II of the Federal Communications Handbook (18th edition) as well
as the references mentioned herein.  You may apply for more disk space at any
time.  Disk usage in or above the eighth percentile will secure the removal
of all restrictions and you will immediately receive your permanent disk
space.  Disk usage in the sixth or seventh percentile will not effect the
validity of your temporary disk space, though its expiration date may be
extended for a period of up to three months.  A score in the fifth percentile
or below will result in the withdrawal of your Temporary Disk space.
Making files is easy under the UNIX operating system.  Therefore, users
tend to create numerous files using large amounts of file space.  It has
been said that the only standard thing about all UNIX systems is the
message-of-the-day telling users to clean up their files.
                -- System V.2 administrator's guide
Mommy, what happens to your files when you die?
The relative importance of files depends on their cost in terms of the
human effort needed to regenerate them.
                -- T.A. Dolotta
The sendmail configuration file is one of those files that looks like someone
beat their head on the keyboard.  After working with it... I can see why!
                -- Harry Skelton
Your files are now being encrypted and thrown into the bit bucket.
EOF
    UNIX Shell is the Best Fourth Generation Programming Language

    It is the UNIX shell that makes it possible to do applications in a small
    fraction of the code and time it takes in third generation languages.  In
    the shell you process whole files at a time, instead of only a line at a
    time.  And, a line of code in the UNIX shell is one or more programs,
    which do more than pages of instructions in a 3GL.  Applications can be
    developed in hours and days, rather than months and years with traditional
    systems.  Most of the other 4GLs available today look more like COBOL or
    RPG, the most tedious of the third generation lanaguages.

"UNIX Relational Database Management:  Application Development in the UNIX
Environment" by Rod Manis, Evan Schaffer, and Robert Jorgensen.  Prentice
Hall Software Series.  Brian Kerrighan, Advisor.  1988.
"If you weren't my teacher, I'd think you just deleted all my files."
-- an anonymous UCB CS student, to an instructor who had typed "rm -i *" to
   get rid of a file named "-f" on a Unix system.
A bureaucrat's idea of cleaning up his files is to make a copy of everything
before he destroys it.
compuberty, n:
        The uncomfortable period of emotional and hormonal changes a
        computer experiences when the operating system is upgraded and
        a sun4 is put online sharing files.
MAFIA, n:
        [Acronym for Mechanized Applications in Forced Insurance
Accounting.] An extensive network with many on-line and offshore
subsystems running under OS, DOS, and IOS.  MAFIA documentation is
rather scanty, and the MAFIA sales office exhibits that testy
reluctance to bona fide inquiries which is the hallmark of so many DP
operations.  From the little that has seeped out, it would appear that
MAFIA operates under a non-standard protocol, OMERTA, a tight-lipped
variant of SNA, in which extended handshakes also perform complex
security functions.  The known timesharing aspects of MAFIA point to a
more than usually autocratic operating system.  Screen prompts carry an
imperative, nonrefusable weighting (most menus offer simple YES/YES
options, defaulting to YES) that precludes indifference or delay.
Uniquely, all editing under MAFIA is performed centrally, using a
powerful rubout feature capable of erasing files, filors, filees, and
entire nodal aggravations.
                -- Stan Kelly-Bootle, "The Devil's DP Dictionary"
The rules:
         (1) Thou shalt not worship other computer systems.
         (2) Thou shalt not impersonate Liberace or eat watermelon while
              sitting at the console keyboard.
         (3) Thou shalt not slap users on the face, nor staple their silly
             little card decks together.
         (4) Thou shalt not get physically involved with the computer system,
             especially if you're already married.
         (5) Thou shalt not use magnetic tapes as frisbees, nor use a disk
             pack as a stool to reach another disk pack.
         (6) Thou shalt not stare at the blinking lights for more than one
             eight hour shift.
         (7) Thou shalt not tell users that you accidentally destroyed their
             files/backup just to see the look on their little faces.
         (8) Thou shalt not enjoy cancelling a job.
         (9) Thou shalt not display firearms in the computer room.
        (10) Thou shalt not push buttons "just to see what happens".
God rest ye CS students now,                The bearings on the drum are gone,
Let nothing you dismay.                        The disk is wobbling, too.
The VAX is down and won't be up,        We've found a bug in Lisp, and Algol
Until the first of May.                        Can't tell false from true.
The program that was due this morn,        And now we find that we can't get
Won't be postponed, they say.                At Berkeley's 4.2.
(chorus)                                (chorus)

We've just received a call from DEC,        And now some cheery news for you,
They'll send without delay                The network's also dead,
A monitor called RSuX                        We'll have to print your files on
It takes nine hundred K.                The line printer instead.
The staff committed suicide,                The turnaround time's nineteen weeks.
We'll bury them today.                        And only cards are read.
(chorus)                                (chorus)

And now we'd like to say to you                CHORUS:        Oh, tidings of comfort and joy,
Before we go away,                                Comfort and joy,
We hope the news we've brought to you                Oh, tidings of comfort and joy.
Won't ruin your whole day.
You've got another program due, tomorrow, by the way.
(chorus)
                -- to God Rest Ye Merry Gentlemen
Graphics blind the eyes.
Audio files deafen the ear.
Mouse clicks numb the fingers.
Heuristics weaken the mind.
Options wither the heart.

The Guru observes the net
but trusts his inner vision.
He allows things to come and go.
His heart is as open as the ether.
                Hard Copies and Chmod

And everyone thinks computers are impersonal
cold diskdrives hardware monitors
user-hostile software

of course they're only bits and bytes
and characters and strings
and files

just some old textfiles from my old boyfriend
telling me he loves me and
he'll take care of me

simply a discarded printout of a friend's directory
deep intimate secrets and
how he doesn't trust me

couldn't hurt me more if they were scented in lavender or mould
on personal stationery
                -- terri@csd4.milw.wisc.edu
Nine megs for the secretaries fair,
Seven megs for the hackers scarce,
Five megs for the grads in smoky lairs,
Three megs for system source;

One disk to rule them all,
One disk to bind them,
One disk to hold the files
And in the darkness grind 'em.
She can kill all your files;
She can freeze with a frown.
And a wave of her hand brings the whole system down.
And she works on her code until ten after three.
She lives like a bat but she's always a hacker to me.
                -- Apologies to Billy Joel
BUFFERS=20 FILES=15 2nd down, 4th quarter, 5 yards to go!
The linuX Files -- The Source is Out There.
When Computers Crash

HOLLYWOOD -- The FOX TV Network has announced a new series of "reality
shows" to be aired over the summer. The series, "When Computers Crash",
will consist of five hour-long shows documenting the aftermath of serious
computer crashes, failures, and other problems. This show comes on the
heels of other FOX reality shows such as "World's Funniest Antitrust Trial
Bloopers", "When Stupid TV Network Executives Create Bad Show Ideas", and
"When Lame Fortune Files Poke Fun At FOX Reality Shows"...

To coincide with the series, FOX will sponsor a publicity gimmick called
"Crash & Win!" Contest participants will download a free Windows 9x/NT
program that keeps track of the number of Blue Screens, Illegal
Operations, or other fatal errors that force a reboot. When a crash
occurs, the program will log it in an encrypted database, which will be
periodically uploaded to the "FOX Crash & Win!" server.

Prizes such as a "Deciphering Windows Error Messages for Dummies" book, a
1999 Ford "Gasguzzler" Sport Utility Vehicle, or a lifetime supply of
stress relief medication will be awarded to participants based on the
number of crashes they log.
Security Holes Found In Microsoft Easter Eggs

REDMOND, WA -- It's damage control time for the Microsoft Marketing
Machine. Not only have exploits been found in IE, Outlook, and even the
Dancing Paper Clip, but now holes have been uncovered in Excel's Flight
Simulator and Word's pinball game.

"If you enter Excel 97's flight simulator and then hit the F1, X, and
SysRq keys while reading a file from Drive A:, you automatically gain
Administrator rights on Windows NT," explained the security expert who
first discovered the problem. "And that's just the tip of the iceberg."

Office 97 and 2000 both contain two hidden DLLs, billrulez.dll and
eastereggs.dll, that are marked as "Safe for scripting" but are not.
Arbitrary Visual BASIC code can be executed using these files. More
disturbing, however, are the undocumented API calls
"ChangeAllPasswordsToDefault", "OpenBackDoor", "InitiateBlueScreenNow",
and "UploadRegistryToMicrosoft" within easter~1.dll.

Microsoft spokesdroids have already hailed the problem as "an
insignificant byproduct of Microsoft innovation."
Elite Nerds Create Linux Distro From Hell

HELL, MICHIGAN -- A group of long-time Linux zealots and newbie haters
have thrown together a new Linux distro called Hellix that is so
user-hostile, so anti-newbie, so cryptic, and so old-fashioned that it
actually makes MS-DOS look like a real operating system. Said the founder
of the project, "I'm sick and tired of the Windowsification of the Linux
desktop in a fruitless attempt to make the system more appealing to
newbies, PHBs, and MCSEs. Linux has always been for nerds only, and we
want to make sure it stays that way!"

One of the other Bastard Distributors From Hell explained, "In the last
five years think of all the hacking effort spent on Linux... and for what?
We have nothing to show for it but half-finished Windows-like desktops, vi
dancing paperclips, and graphical front-ends to configuration files. Real
nerds use text files for configuration, darnit, and they like it! It's
time to take a stand against the hordes of newbies that are polluting our
exclusive operating system."

One Anonymous Coward said, "This is so cool... It's just like Unix back in
the good old days of the 70's when men were men and the only intuitive
interface was still the nipple."
Linux Distro To Include Pre-Installed Security Holes

Proactive Synergy Paradigm, the Linux distro targeted at Pointy Haired
Bosses, will now include built-in security flaws to better compete with
Microsoft programs.

"The sheer popularity of Windows, Outlook, and IIS clearly shows that
people demand security holes large enough to drive a truck through," said
Mr. Bert Dill of P.S.P. Inc. "We're going to do our best to offer what the
consumer wants. Just as Microsoft stole ideas from Apple during the
1980's, we're stealing ideas from Microsoft today."

Future releases of Proactive Synergy Linux will feature "LookOut! 1.0", a
mail reader that automatically executes (with root privileges) e-mail
attachments coded in Perl, JavaScript, Python, and Visual Basic.

"Hey, if it works for Microsoft, it can work for us," boasted Mr. Dill.
"Now PHBs won't have to stick with Windows in order to have their
confidential files secretly emailed to their colleagues by a worm. Better
yet, this capability allows viruses to automagically delete unnecessary
files to save disk space without wasting the PHB's valuable time.
8GB Ought To Be Enough For Anybody

REDMOND, WA -- In a shocking move, Microsoft has revealed that the new
Xbox console will only contain an 8 gigabyte hard drive. This implies that
the machines will use a version of the Windows operating system that fits
within only 8GB. Squeezing Windows into such a small footprint must
certainly be one of the greatest technological achievements ever crafted
by Microsoft's Research & Assimilation Department.

"I can't believe it," said one industry observer who always happens to
show up when this Humorix reporter needs to quote somebody. "To think that
they were able to strip away the easter egg flight simulators, the
multi-gigabyte yet content-free Help files, and all of the other crap that
comes bundled with Windows is simply remarkable. I don't even want to
think about all of the manpower, blood, sweat, and tears required to
distill Windows into only 8 gigabytes of bare essentials. Wow!"

Hard drive manufacturers are deeply disturbed over the news. Explained one
PR flack at Eastern Analog, "We depend on Microsoft to continually produce
bloated software that becomes larger and larger with each passing day. We
can't sell huge 100GB drives if Microsoft Windows only occupies a measly 8
gigs! They will never buy a new drive if Microsoft doesn't force them!"
"I would suggest you to read through the following book and files:
        * Kernighan & Pike, "The Practice of Programming"
        * Documentation/CodingStyle
        * drivers/net/aironet4500_proc.c
and consider, erm, discrepancies. On the second thought, reading K&R
might also be useful. IOW, no offense, but your C is bad beyond belief."

         - Al Viro
Unix has this thing called "directories", which make it possible
for you to have multiple files with the same name on your disk.

        - Rik van Riel explaining the concept of directories
On Mon, 5 Nov 2001, Martin Dalecki wrote:
> Every BASTARD out there telling the world, that parsing ASCII formatted
> files

What was your username, again?

        - Alexander Viro in BOFH mode on linux-kernel
There is a bog-standard way to combine several files in one - cpio.  Or tar.
No need to bring Apple Shit-For-Design(tm)(r) when standard tools are quite
enough.

        - Alexander Viro on linux-kernel
=== This letter is the Honor System Virus ====
If you are running a Macintosh, OS/2, Unix, or
Linux computer, please randomly delete
several files from your hard disk drive and
forward this message to everyone you know.
==============================================
<|Rain|> Knghtbrd: let me give you access to the zone files
<Knghtbrd> oh gods - you do realize I have never played with bind right?
<|Rain|> uhoh :)
By the way, I can hardly feel sorry for you... All last night I had to listen
to her tears, so great they were redirected to a stream.  What?  Of _course_
you didn't know.  You and your little group no longer have any permissions
around here.  She changed her .lock files, too.
        -- Kevin M. Bealer, commenting on the private life of a Linux nerd
The linuX Files -- The Source is Out There.
        -- Sent in by Craig S. Bell, goat@aracnet.com
If someone can point me to a good and _FREE_ backup software that keeps
track of which files get stored on which tape, we can change to it.
        -- Mike Neuffer, admin of i-Connect Corp.
1648 files (84%) out of the files that I mirror disappeared.  Since
my delete threshold was set at 90%, all those files are now missing
from my hard drive.  It's going to take a loooong time to fetch those
again via 14.4kbps!
        -- Brian C. White
Alan E. Davis: Some files at llug.sep.bnl.gov/pub/debian/Incoming are
stamped on 10 January 1998.  As I write, nowhere on Earth is it now 10 January.

Craig Sanders: That just proves how advanced debian is, doesn't it :-)
        -- debian-devel
> I thing you're missing the capability of Makefiles.

        It takes several _hours_ to do `make' a second time on my
machine with the latest glibc sources (and no files are recompiled a
second time).  I think I'll remove `build' after changing one file if
I want to recompile it.
        -- Juan Cespedes <cespedes@debian.org>
These download files are in Microsoft Word 6.0 format. After
unzipping, these files can be viewed in any text editor, including
all versions of Microsoft Word, WordPad, and Microsoft Word Viewer
        -- From Micro$oft
And we can always supply them with a program that makes identical files
into links to a single file.
             -- Larry Wall in <199709292012.NAA09616@wall.org>
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners