Proverbs, aphorisms, quotations (English) | by Linux fortune |
Hello. Jim Rockford's machine, this is Larry Doheny's machine. Will you please have your master call my master at his convenience? Thank you. Thank you. Thank you. Thank you. Thank you. Thank you. -- "The Rockford Files" | |
Hi Jimbo. Dennis. Really appreciate the help on the income tax. You wanna help on the audit now? -- "The Rockford Files" | |
Jim, it's Grace at the bank. I checked your Christmas Club account. You don't have five-hundred dollars. You have fifty. Sorry, computer foul-up! -- "The Rockford Files" | |
Jim, it's Jack. I'm at the airport. I'm going to Tokyo and wanna pay you the five-hundred I owe you. Catch you next year when I get back! -- "The Rockford Files" | |
Jim, this is Janelle. I'm flying tonight, so I can't make our date, and I gotta find a safe place for Daffy. He loves you, Jim! It's only two days, and you'll see. Great Danes are no problem! -- "The Rockford Files" | |
Jim, this is Matty down at Ralph's and Mark's. Some guy named Angel Martin just ran up a fifty buck bar tab. And now he wants to charge it to you. You gonna pay it? -- "The Rockford Files" | |
Mr. Rockford, this is the Thomas Crown School of Dance and Contemporary Etiquette. We aren't going to call again! Now you want these free lessons or what? -- "The Rockford Files" | |
Mr. Rockford? Miss Collins from the Bureau of Licenses. We got your renewal before the extended deadline but not your check. I'm sorry but at midnight you're no longer licensed as an investigator. -- "The Rockford Files" | |
Mr. Rockford? This is Betty Joe Withers. I got four shirts of yours from the Bo Peep Cleaners by mistake. I don't know why they gave me men's shirts but they're going back. -- "The Rockford Files" | |
Mr. Rockford? You don't know me, but I'd like to hire you. Could you call me at... My name is... uh... Never mind, forget it! -- "The Rockford Files" | |
This is Jim Rockford. At the tone leave your name and message; I'll get back to you. This is Maria, Liberty Bail Bonds. Your client, Todd Lieman, skipped and his bail is forfeit. That's the pink slip on your '74 Firebird, I believe. Sorry, Jim, bring it on over. This is Marilyn Reed, I wanta talk to you... Is this a machine? I don't talk to machines! [Click] -- "The Rockford Files" | |
This is the Baron. Angel Martin tells me you buy information. Ok, meet me at one a.m. behind the bus depot, bring five-hundred dollars and come alone. I'm serious! -- "The Rockford Files" | |
Yeah, yo mama dresses you funny and you need a mouse to delete files. | |
50% of the manual is in .pdf readme files | |
Let him choose out of my files, his projects to accomplish. -- Shakespeare, "Coriolanus" | |
All your files have been destroyed (sorry). Paul. | |
As part of an ongoing effort to keep you, the Fortune reader, abreast of the valuable information the daily crosses the USENET, Fortune presents: News articles that answer *your* questions, #1: Newsgroups: comp.sources.d Subject: how do I run C code received from sources Keywords: C sources Distribution: na I do not know how to run the C programs that are posted in the sources newsgroup. I save the files, edit them to remove the headers, and change the mode so that they are executable, but I cannot get them to run. (I have never written a C program before.) Must they be compiled? With what compiler? How do I do this? If I compile them, is an object code file generated or must I generate it explicitly with the > character? Is there something else that must be done? | |
HEAD CRASH!! FILES LOST!! Details at 11. | |
I came, I saw, I deleted all your files. | |
**** IMPORTANT **** ALL USERS PLEASE NOTE **** Due to a recent systems overload error your recent disk files have been erased. Therefore, in accordance with the UNIX Basic Manual, University of Washington Geophysics Manual, and Bylaw 9(c), Section XII of the Revised Federal Communications Act, you are being granted Temporary Disk Space, valid for three months from this date, subject to the restrictions set forth in Appendix II of the Federal Communications Handbook (18th edition) as well as the references mentioned herein. You may apply for more disk space at any time. Disk usage in or above the eighth percentile will secure the removal of all restrictions and you will immediately receive your permanent disk space. Disk usage in the sixth or seventh percentile will not effect the validity of your temporary disk space, though its expiration date may be extended for a period of up to three months. A score in the fifth percentile or below will result in the withdrawal of your Temporary Disk space. | |
Making files is easy under the UNIX operating system. Therefore, users tend to create numerous files using large amounts of file space. It has been said that the only standard thing about all UNIX systems is the message-of-the-day telling users to clean up their files. -- System V.2 administrator's guide | |
Mommy, what happens to your files when you die? | |
The relative importance of files depends on their cost in terms of the human effort needed to regenerate them. -- T.A. Dolotta | |
The sendmail configuration file is one of those files that looks like someone beat their head on the keyboard. After working with it... I can see why! -- Harry Skelton | |
Your files are now being encrypted and thrown into the bit bucket. EOF | |
UNIX Shell is the Best Fourth Generation Programming Language It is the UNIX shell that makes it possible to do applications in a small fraction of the code and time it takes in third generation languages. In the shell you process whole files at a time, instead of only a line at a time. And, a line of code in the UNIX shell is one or more programs, which do more than pages of instructions in a 3GL. Applications can be developed in hours and days, rather than months and years with traditional systems. Most of the other 4GLs available today look more like COBOL or RPG, the most tedious of the third generation lanaguages. "UNIX Relational Database Management: Application Development in the UNIX Environment" by Rod Manis, Evan Schaffer, and Robert Jorgensen. Prentice Hall Software Series. Brian Kerrighan, Advisor. 1988. | |
"If you weren't my teacher, I'd think you just deleted all my files." -- an anonymous UCB CS student, to an instructor who had typed "rm -i *" to get rid of a file named "-f" on a Unix system. | |
A bureaucrat's idea of cleaning up his files is to make a copy of everything before he destroys it. | |
compuberty, n: The uncomfortable period of emotional and hormonal changes a computer experiences when the operating system is upgraded and a sun4 is put online sharing files. | |
MAFIA, n: [Acronym for Mechanized Applications in Forced Insurance Accounting.] An extensive network with many on-line and offshore subsystems running under OS, DOS, and IOS. MAFIA documentation is rather scanty, and the MAFIA sales office exhibits that testy reluctance to bona fide inquiries which is the hallmark of so many DP operations. From the little that has seeped out, it would appear that MAFIA operates under a non-standard protocol, OMERTA, a tight-lipped variant of SNA, in which extended handshakes also perform complex security functions. The known timesharing aspects of MAFIA point to a more than usually autocratic operating system. Screen prompts carry an imperative, nonrefusable weighting (most menus offer simple YES/YES options, defaulting to YES) that precludes indifference or delay. Uniquely, all editing under MAFIA is performed centrally, using a powerful rubout feature capable of erasing files, filors, filees, and entire nodal aggravations. -- Stan Kelly-Bootle, "The Devil's DP Dictionary" | |
The rules: (1) Thou shalt not worship other computer systems. (2) Thou shalt not impersonate Liberace or eat watermelon while sitting at the console keyboard. (3) Thou shalt not slap users on the face, nor staple their silly little card decks together. (4) Thou shalt not get physically involved with the computer system, especially if you're already married. (5) Thou shalt not use magnetic tapes as frisbees, nor use a disk pack as a stool to reach another disk pack. (6) Thou shalt not stare at the blinking lights for more than one eight hour shift. (7) Thou shalt not tell users that you accidentally destroyed their files/backup just to see the look on their little faces. (8) Thou shalt not enjoy cancelling a job. (9) Thou shalt not display firearms in the computer room. (10) Thou shalt not push buttons "just to see what happens". | |
God rest ye CS students now, The bearings on the drum are gone, Let nothing you dismay. The disk is wobbling, too. The VAX is down and won't be up, We've found a bug in Lisp, and Algol Until the first of May. Can't tell false from true. The program that was due this morn, And now we find that we can't get Won't be postponed, they say. At Berkeley's 4.2. (chorus) (chorus) We've just received a call from DEC, And now some cheery news for you, They'll send without delay The network's also dead, A monitor called RSuX We'll have to print your files on It takes nine hundred K. The line printer instead. The staff committed suicide, The turnaround time's nineteen weeks. We'll bury them today. And only cards are read. (chorus) (chorus) And now we'd like to say to you CHORUS: Oh, tidings of comfort and joy, Before we go away, Comfort and joy, We hope the news we've brought to you Oh, tidings of comfort and joy. Won't ruin your whole day. You've got another program due, tomorrow, by the way. (chorus) -- to God Rest Ye Merry Gentlemen | |
Graphics blind the eyes. Audio files deafen the ear. Mouse clicks numb the fingers. Heuristics weaken the mind. Options wither the heart. The Guru observes the net but trusts his inner vision. He allows things to come and go. His heart is as open as the ether. | |
Hard Copies and Chmod And everyone thinks computers are impersonal cold diskdrives hardware monitors user-hostile software of course they're only bits and bytes and characters and strings and files just some old textfiles from my old boyfriend telling me he loves me and he'll take care of me simply a discarded printout of a friend's directory deep intimate secrets and how he doesn't trust me couldn't hurt me more if they were scented in lavender or mould on personal stationery -- terri@csd4.milw.wisc.edu | |
Nine megs for the secretaries fair, Seven megs for the hackers scarce, Five megs for the grads in smoky lairs, Three megs for system source; One disk to rule them all, One disk to bind them, One disk to hold the files And in the darkness grind 'em. | |
She can kill all your files; She can freeze with a frown. And a wave of her hand brings the whole system down. And she works on her code until ten after three. She lives like a bat but she's always a hacker to me. -- Apologies to Billy Joel | |
BUFFERS=20 FILES=15 2nd down, 4th quarter, 5 yards to go! | |
The linuX Files -- The Source is Out There. | |
When Computers Crash HOLLYWOOD -- The FOX TV Network has announced a new series of "reality shows" to be aired over the summer. The series, "When Computers Crash", will consist of five hour-long shows documenting the aftermath of serious computer crashes, failures, and other problems. This show comes on the heels of other FOX reality shows such as "World's Funniest Antitrust Trial Bloopers", "When Stupid TV Network Executives Create Bad Show Ideas", and "When Lame Fortune Files Poke Fun At FOX Reality Shows"... To coincide with the series, FOX will sponsor a publicity gimmick called "Crash & Win!" Contest participants will download a free Windows 9x/NT program that keeps track of the number of Blue Screens, Illegal Operations, or other fatal errors that force a reboot. When a crash occurs, the program will log it in an encrypted database, which will be periodically uploaded to the "FOX Crash & Win!" server. Prizes such as a "Deciphering Windows Error Messages for Dummies" book, a 1999 Ford "Gasguzzler" Sport Utility Vehicle, or a lifetime supply of stress relief medication will be awarded to participants based on the number of crashes they log. | |
Security Holes Found In Microsoft Easter Eggs REDMOND, WA -- It's damage control time for the Microsoft Marketing Machine. Not only have exploits been found in IE, Outlook, and even the Dancing Paper Clip, but now holes have been uncovered in Excel's Flight Simulator and Word's pinball game. "If you enter Excel 97's flight simulator and then hit the F1, X, and SysRq keys while reading a file from Drive A:, you automatically gain Administrator rights on Windows NT," explained the security expert who first discovered the problem. "And that's just the tip of the iceberg." Office 97 and 2000 both contain two hidden DLLs, billrulez.dll and eastereggs.dll, that are marked as "Safe for scripting" but are not. Arbitrary Visual BASIC code can be executed using these files. More disturbing, however, are the undocumented API calls "ChangeAllPasswordsToDefault", "OpenBackDoor", "InitiateBlueScreenNow", and "UploadRegistryToMicrosoft" within easter~1.dll. Microsoft spokesdroids have already hailed the problem as "an insignificant byproduct of Microsoft innovation." | |
Elite Nerds Create Linux Distro From Hell HELL, MICHIGAN -- A group of long-time Linux zealots and newbie haters have thrown together a new Linux distro called Hellix that is so user-hostile, so anti-newbie, so cryptic, and so old-fashioned that it actually makes MS-DOS look like a real operating system. Said the founder of the project, "I'm sick and tired of the Windowsification of the Linux desktop in a fruitless attempt to make the system more appealing to newbies, PHBs, and MCSEs. Linux has always been for nerds only, and we want to make sure it stays that way!" One of the other Bastard Distributors From Hell explained, "In the last five years think of all the hacking effort spent on Linux... and for what? We have nothing to show for it but half-finished Windows-like desktops, vi dancing paperclips, and graphical front-ends to configuration files. Real nerds use text files for configuration, darnit, and they like it! It's time to take a stand against the hordes of newbies that are polluting our exclusive operating system." One Anonymous Coward said, "This is so cool... It's just like Unix back in the good old days of the 70's when men were men and the only intuitive interface was still the nipple." | |
Linux Distro To Include Pre-Installed Security Holes Proactive Synergy Paradigm, the Linux distro targeted at Pointy Haired Bosses, will now include built-in security flaws to better compete with Microsoft programs. "The sheer popularity of Windows, Outlook, and IIS clearly shows that people demand security holes large enough to drive a truck through," said Mr. Bert Dill of P.S.P. Inc. "We're going to do our best to offer what the consumer wants. Just as Microsoft stole ideas from Apple during the 1980's, we're stealing ideas from Microsoft today." Future releases of Proactive Synergy Linux will feature "LookOut! 1.0", a mail reader that automatically executes (with root privileges) e-mail attachments coded in Perl, JavaScript, Python, and Visual Basic. "Hey, if it works for Microsoft, it can work for us," boasted Mr. Dill. "Now PHBs won't have to stick with Windows in order to have their confidential files secretly emailed to their colleagues by a worm. Better yet, this capability allows viruses to automagically delete unnecessary files to save disk space without wasting the PHB's valuable time. | |
8GB Ought To Be Enough For Anybody REDMOND, WA -- In a shocking move, Microsoft has revealed that the new Xbox console will only contain an 8 gigabyte hard drive. This implies that the machines will use a version of the Windows operating system that fits within only 8GB. Squeezing Windows into such a small footprint must certainly be one of the greatest technological achievements ever crafted by Microsoft's Research & Assimilation Department. "I can't believe it," said one industry observer who always happens to show up when this Humorix reporter needs to quote somebody. "To think that they were able to strip away the easter egg flight simulators, the multi-gigabyte yet content-free Help files, and all of the other crap that comes bundled with Windows is simply remarkable. I don't even want to think about all of the manpower, blood, sweat, and tears required to distill Windows into only 8 gigabytes of bare essentials. Wow!" Hard drive manufacturers are deeply disturbed over the news. Explained one PR flack at Eastern Analog, "We depend on Microsoft to continually produce bloated software that becomes larger and larger with each passing day. We can't sell huge 100GB drives if Microsoft Windows only occupies a measly 8 gigs! They will never buy a new drive if Microsoft doesn't force them!" | |
"I would suggest you to read through the following book and files: * Kernighan & Pike, "The Practice of Programming" * Documentation/CodingStyle * drivers/net/aironet4500_proc.c and consider, erm, discrepancies. On the second thought, reading K&R might also be useful. IOW, no offense, but your C is bad beyond belief." - Al Viro | |
Unix has this thing called "directories", which make it possible for you to have multiple files with the same name on your disk. - Rik van Riel explaining the concept of directories | |
On Mon, 5 Nov 2001, Martin Dalecki wrote: > Every BASTARD out there telling the world, that parsing ASCII formatted > files What was your username, again? - Alexander Viro in BOFH mode on linux-kernel | |
There is a bog-standard way to combine several files in one - cpio. Or tar. No need to bring Apple Shit-For-Design(tm)(r) when standard tools are quite enough. - Alexander Viro on linux-kernel | |
=== This letter is the Honor System Virus ==== If you are running a Macintosh, OS/2, Unix, or Linux computer, please randomly delete several files from your hard disk drive and forward this message to everyone you know. ============================================== | |
<|Rain|> Knghtbrd: let me give you access to the zone files <Knghtbrd> oh gods - you do realize I have never played with bind right? <|Rain|> uhoh :) | |
By the way, I can hardly feel sorry for you... All last night I had to listen to her tears, so great they were redirected to a stream. What? Of _course_ you didn't know. You and your little group no longer have any permissions around here. She changed her .lock files, too. -- Kevin M. Bealer, commenting on the private life of a Linux nerd | |
The linuX Files -- The Source is Out There. -- Sent in by Craig S. Bell, goat@aracnet.com | |
If someone can point me to a good and _FREE_ backup software that keeps track of which files get stored on which tape, we can change to it. -- Mike Neuffer, admin of i-Connect Corp. | |
1648 files (84%) out of the files that I mirror disappeared. Since my delete threshold was set at 90%, all those files are now missing from my hard drive. It's going to take a loooong time to fetch those again via 14.4kbps! -- Brian C. White | |
Alan E. Davis: Some files at llug.sep.bnl.gov/pub/debian/Incoming are stamped on 10 January 1998. As I write, nowhere on Earth is it now 10 January. Craig Sanders: That just proves how advanced debian is, doesn't it :-) -- debian-devel | |
> I thing you're missing the capability of Makefiles. It takes several _hours_ to do `make' a second time on my machine with the latest glibc sources (and no files are recompiled a second time). I think I'll remove `build' after changing one file if I want to recompile it. -- Juan Cespedes <cespedes@debian.org> | |
These download files are in Microsoft Word 6.0 format. After unzipping, these files can be viewed in any text editor, including all versions of Microsoft Word, WordPad, and Microsoft Word Viewer -- From Micro$oft | |
And we can always supply them with a program that makes identical files into links to a single file. -- Larry Wall in <199709292012.NAA09616@wall.org> |