DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
protect
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

So do the noble fall.  For they are ever caught in a trap of their own making.
A trap -- walled by duty, and locked by reality.  Against the greater force
they must fall -- for, against that force they fight because of duty, because
of obligations.  And when the noble fall, the base remain.  The base -- whose
only purpose is the corruption of what the noble did protect.  Whose only
purpose is to destroy.  The noble: who, even when fallen, retain a vestige of
strength.  For theirs is a strength born of things other than mere force.
Theirs is a strength supreme... theirs is the strength -- to restore.
                -- Gerry Conway, "Thor", #193
The story you are about to hear is true.  Only the names have been
changed to protect the innocent.
Overall, the philosophy is to attack the availability problem from two
complementary directions:  to reduce the number of software errors through
rigorous testing of running systems, and to reduce the effect of the remaining
errors by providing for recovery from them.  An interesting footnote to this
design is that now a system failure can usually be considered to be the
result of two program errors:  the first, in the program that started the
problem; the second, in the recovery routine that could not protect the
system.
                -- A.L. Scherr, "Functional Structure of IBM Virtual Storage
                   Operating Systems, Part II: OS/VS-2 Concepts and
                   Philosophies," IBM Systems Journal, Vol. 12, No. 4.
Proposed Additions to the PDP-11 Instruction Set:

DC        Divide and Conquer
DMPK        Destroy Memory Protect Key
DO        Divide and Overflow
EMPC        Emulate Pocket Calculator
EPI        Execute Programmer Immediately
EROS        Erase Read Only Storage
EXCE        Execute Customer Engineer
HCF        Halt and Catch Fire
IBP        Insert Bug and Proceed
INSQSW        Insert into queue somewhere (for FINO queues [First in never out])
PBC        Print and Break Chain
PDSK        Punch Disk
Overall, the philosophy is to attack the availability problem from two
complementary directions:  to reduce the number of software errors through
rigorous testing of running systems, and to reduce the effect of the
remaining errors by providing for recovery from them.  An interesting footnote
to this design is that now a system failure can usually be considered to be
the result of two program errors:  the first, in the program that started the
problem; the second, in the recovery routine that could not protect the
system.  -- A. L. Scherr, "Functional Structure of IBM Virtual Storage Operating
Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal,
Vol. 12, No. 4, 1973, pp. 382-400
"We don't have to protect the environment -- the Second Coming is at hand."
-- James Watt
A candidate is a person who gets money from the rich and votes from the
poor to protect them from each other.
        Once there was a marine biologist who loved dolphins. He spent his
time trying to feed and protect his beloved creatures of the sea.  One day,
in a fit of inventive genius, he came up with a serum that would make
dolphins live forever!
        Of course he was ecstatic. But he soon realized that in order to mass
produce this serum he would need large amounts of a certain compound that was
only found in nature in the metabolism of a rare South American bird.  Carried
away by his love for dolphins, he resolved that he would go to the zoo and
steal one of these birds.
        Unbeknownst to him, as he was arriving at the zoo an elderly lion was
escaping from its cage.  The zookeepers were alarmed and immediately began
combing the zoo for the escaped animal, unaware that it had simply lain down
on the sidewalk and had gone to sleep.
        Meanwhile, the marine biologist arrived at the zoo and procured his
bird.  He was so excited by the prospect of helping his dolphins that he
stepped absentmindedly stepped over the sleeping lion on his way back to his
car.  Immediately, 1500 policemen converged on him and arrested him for
transporting a myna across a staid lion for immortal porpoises.
Politics -- the gentle art of getting votes from the poor and campaign
funds from the rich by promising to protect each from the other.
                -- Oscar Ameringer
IBM:
        [International Business Machines Corp.]  Also known as Itty Bitty
        Machines or The Lawyer's Friend.  The dominant force in computer
        marketing, having supplied worldwide some 75% of all known hardware
        and 10% of all software.  To protect itself from the litigious envy
        of less successful organizations, such as the US government, IBM
        employs 68% of all known ex-Attorneys' General.
write-protect tab, n.:
        A small sticker created to cover the unsightly notch carelessly left
        by disk manufacturers.  The use of the tab creates an error message
        once in a while, but its aesthetic value far outweighs the momentary
        inconvenience.
                -- Robb Russon
Seattle is so wet that people protect their property with watch-ducks.
A transistor protected by a fast-acting fuse will protect the fuse by
blowing first.
And all that the Lorax left here in this mess
was a small pile of rocks with the one word, "unless."
Whatever THAT meant, well, I just couldn't guess.
That was long, long ago, and each day since that day,
I've worried and worried and worried away.
Through the years as my buildings have fallen apart,
I've worried about it with all of my heart.

"BUT," says the Oncler, "now that you're here,
the word of the Lorax seems perfectly clear!
UNLESS someone like you cares a whole awful lot,
nothing is going to get better - it's not.
So... CATCH!" cries the Oncler.  He lets something fall.
"It's a truffula seed.  It's the last one of all!

"You're in charge of the last of the truffula seeds.
And truffula trees are what everyone needs.
Plant a new truffula -- treat it with care.
Give it clean water and feed it fresh air.
Grow a forest -- protect it from axes that hack.
Then the Lorax and all of his friends may come back!"
Watching girls go passing by
It ain't the latest thing
I'm just standing in a doorway
I'm just trying to make some sense
Out of these girls passing by                A smile relieves the heart that grieves
The tales they tell of men                Remember what I said
I'm not waiting on a lady                I'm not waiting on a lady
I'm just waiting on a friend                I'm just waiting on a friend
...
Don't need a whore
Don't need no booze
Don't need a virgin priest                Ooh, making love and breaking hearts
But I need someone I can cry to                It is a game for youth
I need someone to protect                But I'm not waiting on a lady
                                        I'm just waiting on a friend
                                        I'm just waiting on a friend
                -- Rolling Stones, "Waiting on a Friend"
A princess should not be afraid -- not with a brave knight to protect her.
                -- McCoy, "Shore Leave", stardate 3025.3
If a man had a child who'd gone anti-social, killed perhaps, he'd still
tend to protect that child.
                -- McCoy, "The Ultimate Computer", stardate 4731.3
So what is the best way to protect yourself against the ILOVEYOU virus? Install
Linux. If that's not an option, try uninstalling Windows.

   -- Geoff Johnson
Attack of the Tuxissa Virus

What started out as a prank posting to comp.os.linux.advocacy yesterday has
turned into one of the most significant viruses in computing history.
The creator of the virus, who goes by the moniker "Anonymous Longhair",
modified the Melissa virus to install Linux on infected machines.

"It's a work of art," one Linux advocate told Humorix after he looked
through the Tuxissa virus source code.  "This virus goes well beyond the
feeble troublemaking of Melissa.  It actually configures a UMSDOS partition
on the user's hard drive and then downloads and installs a stripped-down
version of Slackware Linux."

The email message that the virus is attached to has the subject "Important
Message About Windows Security".  The text of the body says, "I want to let
you know about some security problems I've uncovered in Windows 95/98/NT,
Office 95/97, and Outlook. It's critically important that you protect your
system against these attacks.  Visit these sites for more information..."
The rest of the message contains 42 links to sites about Linux and free
software.

Details on how the virus started are a bit sketchy.  The "Anonymous
Longhair" who created it only posted it to Usenet as an early April Fool's
gag, demonstrating how easy it would be to mount a "Linux revolution".
Insurance Company To Offer Microsoft Audit Protection Plans

LOUDON, TENNESSEE -- Companies, organizations, and government agencies all
across the world are facing a disaster of epic proportions: the impending
invasion of the Microsoft Intellectual Property Police. The counter this
menace, Loydds of Loudon, Tennessee, the prestigious insurance firm, has
started to offer "Audit Insurance" to protect against unexpected "random"
audits from everybody's favorite software monopoly.

"We've received numerous inquiries about this type of protection," company
co-founder Bob Loydds said. "Businessmen are no longer worried about
earthquakes, fires, or other natural disasters. The big fear of the 21st
Century comes from Redmond."

The insurance firm is currently in negotiations with Red Hat to form the
"Red Berets", an elite squad of Linux geeks trained to rapidly install
Linux and hide all traces of Windows on every computer within an
organization. During a Defcon 95 emergency, Loydds will airlift the
squadron and a crate of Linux CDs to any position in the country within
hours. The Red Berets will wipe away all vestiges of Microsoft software so
that when the auditors show up they won't have anything to audit.
  If you really want to know where you stand, it'll cost you around
  $15K and that, in my opinion, is fine. If it isn't worth $15K to
  protect your code then it is worth so little to you that there really
  is no good reason not to just GPL it from the start.

        - Larry McVoy on GPL licensing issues
Better to stop short than fill to the brim.
Oversharpen the blade, and the edge will soon blunt.
Amass a store of gold and jade, and no one can protect it.
Claim wealth and titles, and disaster will follow.
Retire when the work is done.
This is the way of heaven.
And he climbed with the lad up the Eiffelberg Tower.  "This," cried the Mayor,
"is your town's darkest hour!  The time for all Whos who have blood that is red
to come to the aid of their country!" he said.  "We've GOT to make noises in
greater amounts!  So, open your mouth, lad!  For every voice counts!"  Thus he
spoke as he climbed.  When they got to the top, the lad cleared his throat and
he shouted out, "YOPP!"
        And that Yopp...  That one last small, extra Yopp put it over!
Finally, at last!  From the speck on that clover their voices were heard!
They rang out clear and clean.  And they elephant smiled.  "Do you see what
I mean?" They've proved they ARE persons, no matter how small.  And their
whole world was saved by the smallest of All!"
        "How true!  Yes, how true," said the big kangaroo.  "And, from now
on, you know what I'm planning to do?  From now on, I'm going to protect
them with you!"  And the young kangaroo in her pouch said, "ME TOO!  From
the sun in the summer.  From rain when it's fall-ish, I'm going to protect
them.  No matter how small-ish!"
                -- Dr. Seuss "Horton Hears a Who"
"Pacific Bell Customer Service, this is [..], how can I provide you with
excellent customer service today?"
"HAHAHAHAHA!!  That's good, I like it.."
"Um, thanks, they make us say that."
        -- knghtbrd and a pacbell rep, name removed to protect her job
Marijuana will be legal some day, because the many law students
who now smoke pot will someday become congressmen and legalize
it in order to protect themselves.
                -- Lenny Bruce
A memorandum is written not to inform the reader, but to protect the writer.
                -- Dean Acheson
tmps_base = tmps_max;                /* protect our mortal string */
             -- Larry Wall in stab.c from the perl source code
A CODE OF ETHICAL BEHAVIOR FOR PATIENTS:

7. PAY YOUR MEDICAL BILLS PROMPTLY AND WILLINGLY.
        You should consider it a privilege to contribute, however modestly,
        to the well-being of physicians and other humanitarians.

8. DO NOT SUFFER FROM AILMENTS THAT YOU CANNOT AFFORD.
        It is sheer arrogance to contract illnesses that are beyond your means.

9. NEVER REVEAL ANY OF THE SHORTCOMINGS THAT HAVE COME TO LIGHT IN THE COURSE
   OF TREATMENT BY YOUR DOCTOR.
        The patient-doctor relationship is a privileged one, and you have a
        sacred duty to protect him from exposure.

10. NEVER DIE WHILE IN YOUR DOCTOR'S PRESENCE OR UNDER HIS DIRECT CARE.
        This will only cause him needless inconvenience and embarrassment.
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners