DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
hackers
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

evil hackers from Serbia.
APL hackers do it in the quad.
Hackers are just a migratory lifeform with a tropism for computers.
Hackers of the world, unite!
If graphics hackers are so smart, why can't they get the bugs out of
fresh paint?
`Lasu' Releases SAG 0.3 -- Freeware Book Takes Paves For New World Order
by staff writers

        ...
        The central Superhighway site called ``sunsite.unc.edu''
collapsed in the morning before the release.  News about the release had
been leaked by a German hacker group, Harmonious Hardware Hackers, who
had cracked into the author's computer earlier in the week.  They had
got the release date wrong by one day, and caused dozens of eager fans
to connect to the sunsite computer at the wrong time.  ``No computer can
handle that kind of stress,'' explained the mourning sunsite manager,
Erik Troan.  ``The spinning disks made the whole computer jump, and
finally it crashed through the floor to the basement.''  Luckily,
repairs were swift and the computer was working again the same evening.
``Thank God we were able to buy enough needles and thread and patch it
together without major problems.''  The site has also installed a new
throttle on the network pipe, allowing at most four clients at the same
time, thus making a new crash less likely.  ``The book is now in our
Incoming folder'', says Troan, ``and you're all welcome to come and get it.''
                -- Lars Wirzenius <wirzeniu@cs.helsinki.fi>
                   [comp.os.linux.announce]
The Tao doesn't take sides;
it gives birth to both wins and losses.
The Guru doesn't take sides;
she welcomes both hackers and lusers.

The Tao is like a stack:
the data changes but not the structure.
the more you use it, the deeper it becomes;
the more you talk of it, the less you understand.

Hold on to the root.
"You know why there are so few sophisticated computer terrorists in the United
States?  Because your hackers have so much mobility into the establishment.
Here, there is no such mobility.  If you have the slightest bit of intellectual
integrity you cannot support the government.... That's why the best computer
minds belong to the opposition."
- an anonymous member of the outlawed Polish trade union, Solidarity
Moon, n.:
        1. A celestial object whose phase is very important to hackers.  See
        PHASE OF THE MOON.  2. Dave Moon (MOON@MC).
user, n.:
        The word computer professionals use when they mean "idiot."
                -- Dave Barry, "Claw Your Way to the Top"

[I always thought "computer professional" was the phrase hackers used
when they meant "idiot."  Ed.]
A is for awk, which runs like a snail, and
B is for biff, which reads all your mail.
C is for cc, as hackers recall, while
D is for dd, the command that does all.
E is for emacs, which rebinds your keys, and
F is for fsck, which rebuilds your trees.
G is for grep, a clever detective, while
H is for halt, which may seem defective.
I is for indent, which rarely amuses, and
J is for join, which nobody uses.
K is for kill, which makes you the boss, while
L is for lex, which is missing from DOS.
M is for more, from which less was begot, and
N is for nice, which it really is not.
O is for od, which prints out things nice, while
P is for passwd, which reads in strings twice.
Q is for quota, a Berkeley-type fable, and
R is for ranlib, for sorting ar table.
S is for spell, which attempts to belittle, while
T is for true, which does very little.
U is for uniq, which is used after sort, and
V is for vi, which is hard to abort.
W is for whoami, which tells you your name, while
X is, well, X, of dubious fame.
Y is for yes, which makes an impression, and
Z is for zcat, which handles compression.
                -- THE ABC'S OF UNIX
An Hacker there was, one of the finest sort
Who controlled the system; graphics was his sport.
A manly man, to be a wizard able;
Many a protected file he had sitting on his table.
His console, when he typed, a man might hear
Clicking and feeping wind as clear,
Aye, and as loud as does the machine room bell
Where my lord Hacker was Prior of the cell.
The Rule of good St Savage or St Doeppnor
As old and strict he tended to ignore;
He let go by the things of yesterday
And took the modern world's more spacious way.
He did not rate that text as a plucked hen
Which says that Hackers are not holy men.
And that a hacker underworked is a mere
Fish out of water, flapping on the pier.
That is to say, a hacker out of his cloister.
That was a text he held not worth an oyster.
And I agreed and said his views were sound;
Was he to study till his head wend round
Poring over books in the cloisters?  Must he toil
As Andy bade and till the very soil?
Was he to leave the world upon the shelf?
Let Andy have his labor to himself!
                -- Chaucer
                [well, almost.  Ed.]
Nine megs for the secretaries fair,
Seven megs for the hackers scarce,
Five megs for the grads in smoky lairs,
Three megs for system source;

One disk to rule them all,
One disk to bind them,
One disk to hold the files
And in the darkness grind 'em.
No plain fanfold paper could hold that fractal Puff --
He grew so fast no plotting pack could shrink him far enough.
Compiles and simulations grew so quickly tame
And swapped out all their data space when Puff pushed his stack frame.
        (refrain)
Puff, he grew so quickly, while others moved like snails
And mini-Puffs would perch themselves on his gigantic tail.
All the student hackers loved that fractal Puff
But DCS did not like Puff, and finally said, "Enough!"
        (refrain)
Puff used more resources than DCS could spare.
The operator killed Puff's job -- he didn't seem to care.
A gloom fell on the hackers; it seemed to be the end,
But Puff trapped the exception, and grew from naught again!
        (refrain)
Refrain:
        Puff the fractal dragon was written in C,
        And frolicked while processes switched in mainframe memory.
        Puff the fractal dragon was written in C,
        And frolicked while processes switched in mainframe memory.
Oh Lord, won't you buy me a 4BSD?
My friends all got sources, so why can't I see?
Come all you moby hackers, come sing it out with me:
To hell with the lawyers from AT&T!
Once there was a little nerd who loved to read your mail,
And then yank back the i-access times to get hackers off his tail,
And once as he finished reading from the secretary's spool,
He wrote a rude rejection to her boyfriend (how uncool!)
And this as delivermail did work and he ran his backfstat,
He heard an awful crackling like rat fritters in hot fat,
And hard errors brought the system down 'fore he could even shout!
        And the bio bug'll bring yours down too, ef you don't watch out!
And once they was a little flake who'd prowl through the uulog,
And when he went to his blit that night to play at being god,
The ops all heard him holler, and they to the console dashed,
But when they did a ps -ut they found the system crashed!
Oh, the wizards adb'd the dumps and did the system trace,
And worked on the file system 'til the disk head was hot paste,
But all they ever found was this:  "panic: never doubt",
        And the bio bug'll crash your box too, ef you don't watch out!
When the day is done and the moon comes out,
And you hear the printer whining and the rk's seems to count,
When the other desks are empty and their terminals glassy grey,
And the load is only 1.6 and you wonder if it'll stay,
You must mind the file protections and not snoop around,
        Or the bio bug'll getcha and bring the system down!
What segment's this, that, laid to rest
On FHA0, is sleeping?
What system file, lay here a while        This, this is "acct.run,"
While hackers around it were weeping?        Accounting file for everyone.
                                        Dump, dump it and type it out,
                                        The file, the highseg of login.
Why lies it here, on public disk
And why is it now unprotected?
A bug in incant, made it thus.                Mount, mount all your DECtapes now
And copy the file somehow, somehow.        The problem has not been corrected.
                                        Dump, dump it and type it out,
                                        The file, the highseg of login.
                -- to Greensleeves
When you overesteem great hackers,
more users become cretins.
When you develop encryption,
more users become crackers.

The Guru leads
by emptying user's minds
and increasing their quotas,
by weakening their ambition
and toughening their resolve.
When users lack knowledge and desire,
management will not try to interfere.

Practice not-looping,
and everything will fall into place.
"It is a relief and a joy when I see a regiment of hackers digging in to hold the line, and I realize, this city may survive--for now."

  -- Richard Stallman (Open Sources, 1999 O'Reilly and Associates)
'Kitchen Sink' OS Announced

Coding has begun on a new operating system code named 'Kitchen Sink'. The new
OS will be based entirely on GNU Emacs. One programmer explained, "Since many
hackers spend a vast amount of their time in Emacs, why not just make it the
operating system?" When asked about the name, he responded, "Well, it has been
often said that Emacs has everything except a kitchen sink. Now it will."

One vi advocate said, "What the hell?!?! Those Emacs people are nuts. It seems
that even with a programming language, a web browser, and God only knows what
else built into their text editor, they're still not satisfied. Now they want
it to be an operating system. Hell, even Windows ain't that bloated!"
Open Source Beer Revolution

Yesterday, Red Hat introduced an 'open source' beer called Red Brew. The
recipes for making the beer are available for free over the Net, and
microbrewery kits are available at low cost from Red Hat. Says a Red Hat
spokesman, "With the proliferation of free (open source) software, it was only
a matter of time before open source beer became reality. After all, the only
thing hackers like more than free software is free beer!"

Following the Red Hat annoucement, other companies are racing to launch their
own beer 'distribution'. Caldera is developing an OpenBrew beer. Meanwhile,
Patrick Volkerding is working on a SlackBeer distribution, and DebianBrew is
expected soon.

Traditional breweries and beer distributors are not thrilled about open source
beer. "This is ludicrous! People want beer that comes from time-tested, secret
recipes -- not beer from recipes invented overnight! Open source is a fad," a
spokesman for Buddwizzer Beer, Inc. said. In addition, other beverage
distributors are nervous. "First open source beer, and soon open source soft
drinks! Before we know it, we'll have RedCoke and SlackPepsi! This open source
plague must be stopped before it eats into our bottom line! Don't quote me on
that last sentence," the CEO of Croak-a-Cola said.
Linux Drinking Game (Abridged)

With a group of friends, take turns reading articles about Linux from popular
media sources (Ziff-Davis AnchorDesk is recommended) or postings on Usenet (try
alt.fan.bill-gates). If the author says one of the things below, take a drink.
Continue until everyone involved is plastered.

- Linux will never go mainstream
- Any platform that can't run Microsoft Office [or some other Microsoft
  "solution"] sucks
- Linux is hard to install
- Linux tech support is lacking
- No one ever got fired for choosing Microsoft
- Any OS with a command line interface is primitive
- Microsoft is an innovative company
- Could you get fired for choosing Linux?
- Linux was created by a bunch of snot-nosed 14 year old hackers with acne and
  no life
- Security through obscurity is the way to go
- Linus and Unix are 70s technology while NT is 90s technology
- All Linux software must be released under the GPL
- Linux is a great piece of shareware
Humorix Holiday Gift Idea #2

Nerd Trading Cards
Price: $10/pack
Producer: Bottomms; 1-800-NRDS-ROK

Forget baseball, nerd trading cards are the future.  Now your kids can
collect and trade cards of their favorite open source hackers and computer
industry figures.  Some of the cards included feature Linus Torvalds, Richard
M. Stallman, and Larry Wall.  Also contains cards for companies (Red Hat,
Netscape, Transmeta, etc.), specific open source programs (Apache, Perl,
Mozilla, etc.), and well-known websites (Slashdot, Freshmeat, etc.).  Each
card features a full-color picture on the front and complete information and
statistics on back. Some of the cards have even been autographed.  Quit
trying to search eBay.com for a Mark McGwire rookie card and collect nerd
cards instead!
Microsoft Open Source Solitaire

REDMOND, WA -- In a first attempt at "embrace-and-extend" of open source
software, Microsoft will release its popular Solitaire and FreeCell games as
open source under the MILA (Microsoft Innovative License Agreement).
According to a Microsoft press release, the Visual C++ source code for the
two games will be available from the Microsoft website "in the first quarter"
(no year was specified).

Industry pundits hail the move as revolutionary.  "Microsoft's release of its
most popular Windows feature as open source software demonstrates just how
innovative the company really is.  The DoJ is clearly barking up the wrong
tree," wrote one Ziff-Davis flunkie. One executive at a large company said,
"Freely available source code is the best idea Microsoft has ever invented."

One Linux developer told Humorix, "Let's just hope some fool doesn't try to
port this thing to Linux.  Imagine the havoc that could ensue if a bunch of
core Linux contributors downloaded Solitaire and became addicted to it.  It
would be a disaster!  Linux and open source development would grind to a halt
while the hackers wasted their time playing Solitaire or FreeCell.  'Just one
more game...' they would say."
Microsoft Mandatory Survey (#18)

Customers who want to upgrade to Windows 98 Second Edition must now fill
out a Microsoft survey online before they can order the bugfix/upgrade.

Question 18: Witnessing the popularity of "Dilbert", Microsoft has plans
     to launch a syndicated comic strip featuring life at Microsoft. What
     characters would you like to see in such a comic strip?

A. Judge Jackson, the goofy court judge who is always making foolish (and
   funny) decisions

B. Bob, a wacky Microsoft programmer who likes to insert easter eggs in
   his work, and who is addicted to playing "Age of Empires"

C. Bill Gates, the intelligent nerd extraordinaire who always gets his way
   by simply giving people large sums of money

D. Ed Muth, the Microsoft spokesman who keeps putting his foot in his
   mouth. When not in public, he's a surprisingly sexy "chic magnet"

E. Poorard Stalinman, the leader of a movement of hackers to provide
   "free" software for the masses at the expense of Capitalistic values
Jargon Coiner (#12)

An irregular feature that aims to give you advance warning of new jargon
that we've just made up.

* IPO (I've Patented the Obvious): Acquiring patents on trivial things and
  then hitting other companies over the head with them.

  Example: "Amazon just IPO'd one-click spam and is now ready to sue B&N."

* IPO (I'm Pissed Off): Exclamation given by a Linux user who was unable
  to participate in a highly lucrative Linux IPO due to lack of capital or
  E*Trade problems. Also uttered by Linux hackers who did not receive The
  Letter from Red Hat or VA Linux even though their friends did.
  
* YAKBA (Yet Another Killer Backhoe Attack): The acronym that describes
  network outtages caused by a careless backhoe operator.

  Examples: "Don't blame us, our website was offline after we suffered a
  YAKBA". "Don't worry about Y2K, what we need to think about is
  YAKBA-compliance."
New Linux Companies Hope To Get Rich Quick (#3)

In the "Cathedral and the Bazaar", ESR mentions that one motivation behind
Open Source software is ego-gratification. That's where OpenEgo, Inc.
comes in. For a fee, the hackers at OpenEgo will produce a piece of Open
Source software and distribute it in your name, thus building up your
reputation and ego. You can quickly become the envy of all your friends --
without lifting a finger. Want a higher-paying tech job? With OpenEgo's
services, you'll look like an Open Source pro in no time, and have dozens
of hot job offers from across the country.

Says the OpenEgo sales literature, "Designing, implementing, maintaining,
and promoting a successful Open Source project is a pain. However, at
OpenEgo, we do all the work while you reap all the rewards..." A page on
the OpenEgo site claims, "We produced a Linux kernel patch for one
customer last year that was immediately accepted by Linus Torvalds...
Within days the person gained employment at Transmeta and is now on the
road to IPO riches..."

Prices range from $1,000 for a small program to $5,000 for a kernel patch.
Brief History Of Linux (#25)

By the mid-1990's the Linux community was burgeoning as countless geeks
fled Redmond monopolistic oppression, Armonk cluelessness, and Cupertino
click-and-drool reality distortion fields. By late 1991 there was an
informal Linux User Group in Finland, although its primary focus was Linux
advocacy, not drinking beer and telling Microsoft jokes as most do today.

Kernel development continued at a steady clip, with more and more people
joining in and hoping that their patches would be accepted by the
Benevolent Dictator himself. To have a patch accepted by Linus was like
winning the Nobel Prize, but to face rejection was like being rejected
from Clown College. The reputation game certainly sparked some flame wars.

One of the most memorable crisis was over the behavior of the delete and
backspace keys. A certain faction of hackers wanted the Backspace key to
actually backspace and the Delete key to actually delete. Linus wasn't too
keen on the proposed changes; "It Works For Me(tm)" is all he said. Some
observers now think Linus was pulling rank to get back at the unknown
hacker who managed to slip a patch by him that replaced the "Kernel panic"
error with "Kernel panic: Linus probably fscked it all up again".
Unobfuscated Perl (#1)

A rogue group of Perl hackers has presented a plan to add a "use
really_goddamn_strict" pragma that would enforce readability and
UNobfuscation. With this pragma in force, the Perl compiler might say:

* Warning: Program contains zero comments. You've probably never seen or
  used one before; they begin with a # symbol. Please start using them or
  else a representative from the nearest Perl Mongers group will come to
  your house and beat you over the head with a cluestick.

* Warning: Program uses a cute trick at line 125 that might make sense in
  C. But this isn't C!

* Warning: Code at line 412 indicates that programmer is an idiot. Please
  correct error between chair and monitor.

* Warning: While There's More Than One Way To Do It, your method at line
  523 is particularly stupid. Please try again.
Unobfuscated Perl (#2)

A rogue group of Perl hackers has presented a plan to add a "use
really_goddamn_strict" pragma that would enforce readability and
UNobfuscation. With this pragma in force, the Perl compiler might say:

* Warning: Write-only code detected between lines 612 and 734. While this
  code is perfectly legal, you won't have any clue what it does in two
  weeks. I recommend you start over.

* Warning: Code at line 1,024 is indistinguishable from line noise or the
  output of /dev/random

* Warning: Have you ever properly indented a piece of code in your entire
  life? Evidently not.

* Warning: I think you can come up with a more descriptive variable name than
  "foo" at line 1,523.

* Warning: Programmer attempting to re-invent the wheel at line 2,231.
  There's a function that does the exact same thing on CPAN -- and it
  actually works.
Microsoft Fights Linux -- By Contributing Kernel Patches

If you can't beat 'em, join 'em... and then destory 'em. That seems to be the
new Microsoft strategy for dealing with Linux. Instead of fighting a FUD or
patent war, Microsoft operatives are doing something totally out of character:
they are contributing patches for the Linux kernel and other programs.

Don't worry, Microsoft is still evil. It's all part of a massive denial of
service attack against Linus Torvalds designed to bring kernel development to
a standstill. By sending over 10,000 patches per minute by email to Linus and
other top kernel hackers, Microsoft has exposed Linux's Achilles heel.

"I can't believe this is happening!" one stressed-out kernel hacker said at a
press conference on IRC. "If this goes on, we may have to conduct kernel
development over some other network protocol, like avian carriers... Aw crap,
there's smoke coming from my email server! Ahh... it can't handle the load!"
At this point the developer cut off and we haven't heard from him since.

At first Linus was unsure where the deluge of patches was coming from. But
when he saw one patch to replace kernel panics with bluescreens, the source
was pretty obvious. "Oh, and the fact that all of the patches are covered by
Microsoft's GPL [Grossly Private License] was a dead giveaway, too,"
<movement> hmm, all you kernel hackers spending too much time adding
           fortunes instead of important stuff :)

        - John Levon trying to grasp kernel hacking reality
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners