DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
root
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

Groundskeepers stole the root password
Root nameservers are out of sync
root rot
Jan  9 16:41:27 huber su: 'su root' succeeded for .... on /dev/pts/1
Due to the CDA, we no longer have a root account.
Root name servers corrupted.
Asynchronous inputs are at the root of our race problems.
                -- D. Winker and F. Prosser
        It is a period of system war.  User programs, striking from a hidden
directory, have won their first victory against the evil Administrative Empire.
During the battle, User spies managed to steal secret source code to the
Empire's ultimate program: the Are-Em Star, a privileged root program with
enough power to destroy an entire file structure.  Pursued by the Empire's
sinister audit trail, Princess _LPA0 races ~ aboard her shell script,
custodian of the stolen listings that could save her people, and restore
freedom and games to the network...
                -- DECWARS
Premature optimization is the root of all evil.
                -- D.E. Knuth
Recursion is the root of computation since it trades description for time.
Sendmail may be safely run set-user-id to root.
                -- Eric Allman, "Sendmail Installation Guide"
        *** System shutdown message from root ***

System going down in 60 seconds
The Tao doesn't take sides;
it gives birth to both wins and losses.
The Guru doesn't take sides;
she welcomes both hackers and lusers.

The Tao is like a stack:
the data changes but not the structure.
the more you use it, the deeper it becomes;
the more you talk of it, the less you understand.

Hold on to the root.
                                UNIX Trix

For those of you in the reseller business, here is a helpful tip that will
save your support staff a few hours of precious time.  Before you send your
next machine out to an untrained client, change the permissions on /etc/passwd
to 666 and make sure there is a copy somewhere on the disk.  Now when they
forget the root password, you can easily login as an ordinary user and correct
the damage.  Having a bootable tape (for larger machines) is not a bad idea
either.  If you need some help, give us a call.
                -- CommUNIXque 1:1, ASCAR Business Systems
"Money is the root of all money."
-- the moving finger
And yet, seasons must be taken with a grain of salt, for they too have
a sense of humor, as does history.  Corn stalks comedy, comedy stalks
tragedy, and this too is historic.  And yet, still, when corn meets
tragedy face to face, we have politics.
                -- Dalglish, Larsen and Sutherland, "Root Crops and
                   Ground Cover"
Etymology, n.:
        Some early etymological scholars came up with derivations that
        were hard for the public to believe.  The term "etymology" was formed
        from the Latin "etus" ("eaten"), the root "mal" ("bad"), and "logy"
        ("study of").  It meant "the study of things that are hard to swallow."
                -- Mike Kellen
FORTUNE PROVIDES QUESTIONS FOR THE GREAT ANSWERS: #19
A:        To be or not to be.
Q:        What is the square root of 4b^2?
"Irrationality is the square root of all evil"
                -- Douglas Hofstadter
Cancel me not -- for what then shall remain?
Abscissas, some mantissas, modules, modes,
A root or two, a torus and a node:
The inverse of my verse, a null domain.
                -- Stanislaw Lem, "Cyberiad"
Ever since I was a young boy,
I've hacked the ARPA net,
From Berkeley down to Rutgers,                He's on my favorite terminal,
Any access I could get,                        He cats C right into foo,
But ain't seen nothing like him,        His disciples lead him in,
On any campus yet,                        And he just breaks the root,
That deaf, dumb, and blind kid,                Always has full SYS-PRIV's,
Sure sends a mean packet.                Never uses lint,
                                        That deaf, dumb, and blind kid,
                                        Sure sends a mean packet.
He's a UNIX wizard,
There has to be a twist.
The UNIX wizard's got                        Ain't got no distractions,
Unlimited space on disk.                Can't hear no whistles or bells,
How do you think he does it?                Can't see no message flashing,
I don't know.                                Types by sense of smell,
What makes him so good?                        Those crazy little programs,
                                        The proper bit flags set,
                                        That deaf, dumb, and blind kid,
                                        Sure sends a mean packet.
                -- UNIX Wizard
"For a couple o' pins," says Troll, and grins,
"I'll eat thee too, and gnaw thy shins.
A bit o' fresh meat will go down sweet!
I'll try my teeth on thee now.
        Hee now!  See now!
I'm tired o' gnawing old bones and skins;
I've a mind to dine on thee now."

But just as he thought his dinner was caught,
He found his hands had hold of naught.
Before he could mind, Tom slipped behing
And gave him the boot to larn him.
        Warn him!  Darn him!
A bump o' the boot on the seat, Tom thoguht,
Would be the way to larn him.

But harder than stone is the flesh and bone
Of a troll that sits in the hills alone.
As well set your boot to the mountain's root,
For the seat of a troll don't feel it.
        Peel it!  Heal it!
Old Troll laughed, when he heard Tom groan,
And he knew his toes could feel it.

Tom's leg is game, since home he came,
And his bootless foot is lasting lame;
But Troll don't care, and he's still there
With the bone he boned from its owner.
        Doner!  Boner!
Troll's old seat is still the same,
And the bone he boned from its owner!
                -- J. R. R. Tolkien
Hop along my little friends, up the Withywindle!
Tom's going on ahead candles for to kindle.
Down west sinks the Sun; soon you will be groping.
When the night-shadows fall, then the door will open,
Out of the winfow-panes light will twinkle yellow.
Fear no alder black!  Heed no hoary willow!
Fear neither root nor bough!  Tom goes on before you.
Hey now! merry dol!  We'll be waiting for you!
                -- J. R. R. Tolkien
I'll grant thee random access to my heart,
Thoul't tell me all the constants of thy love;
And so we two shall all love's lemmas prove
And in our bound partition never part.

Cancel me not -- for what then shall remain?
Abscissas, some mantissas, modules, modes,
A root or two, a torus and a node:
The inverse of my verse, a null domain.

I see the eigenvalue in thine eye,
I hear the tender tensor in thy sigh.
Bernoulli would have been content to die
Had he but known such a-squared cos 2(thi)!
                -- Stanislaw Lem, "Cyberiad"
Invasion of the Dancing Penguin

Those annoying, dancing cartoon characters embedded in software applications
are no longer confined to Microsoft programs.  They have entered the realm
of Linux.  A new Linux distribution under development, called LinTux,
promises to provide a more "user-friendly" environment through its "Dancing
Penguin" assistant.

Dancing Tux will "guide" users through the installation process and will be
a permanent fixture of the X root window.  The LinTux staff demonstrated a
prototype version of the Dancing Tux program to this Humorix reporter.  It
was certainly impressive, but, like the Dancing Paper Clip in Microsoft
Office, it becomes annoying very fast.

The one redeeming feature of LinTux is that, when the system is idle,
Dancing Tux becomes a make-shift screen saver.  The animations included in
the prototype were quite amusing.  For instance, in one scene, Tux chases
Bill Gates through an Antarctic backdrop.  In another animation, Tux can be
seen drinking beers with his penguin pals and telling Microsoft jokes.
Linux Distro To Include Pre-Installed Security Holes

Proactive Synergy Paradigm, the Linux distro targeted at Pointy Haired
Bosses, will now include built-in security flaws to better compete with
Microsoft programs.

"The sheer popularity of Windows, Outlook, and IIS clearly shows that
people demand security holes large enough to drive a truck through," said
Mr. Bert Dill of P.S.P. Inc. "We're going to do our best to offer what the
consumer wants. Just as Microsoft stole ideas from Apple during the
1980's, we're stealing ideas from Microsoft today."

Future releases of Proactive Synergy Linux will feature "LookOut! 1.0", a
mail reader that automatically executes (with root privileges) e-mail
attachments coded in Perl, JavaScript, Python, and Visual Basic.

"Hey, if it works for Microsoft, it can work for us," boasted Mr. Dill.
"Now PHBs won't have to stick with Windows in order to have their
confidential files secretly emailed to their colleagues by a worm. Better
yet, this capability allows viruses to automagically delete unnecessary
files to save disk space without wasting the PHB's valuable time.
Press Release -- For Immediate Release
Microsoft Corporation, Redmond, WA

...Virtually all version of Linux (and Unix) contain a security hole that
allows unauthorized users to gain complete control over the machine. By
simply typing "root" at the login prompt and supplying a password from a
limited number of possibilities, a malicious user can easily gain
administrator privileges. This hole can be breached in seconds with only a
dozen or so keystrokes...

We suspect this issue has been known to Red Hat and other Linux
distributors for years and they have refused to acknowlege its existence
or supply a patch preventing users from exploiting the "root" login
loophole...

By ignoring the problem, the Linux community has proven that installing
Linux is a dangerous proposition that could get you fired. We would like
to point out that Windows XP does not suffer from this gaping hole...
Tests conducted by both Ziff-Davis and Mindcraft prove that Windows XP is
indeed the most secure operating system ever produced...
Solving The Virus Problem Once And For All

System administrators across the globe have tried installing anti-virus
software. They've tried lecturing employees not to open unsolicited email
attachments. They've tried installing firewalls and the latest security
patches. But even with these precautions, email viruses continue to rank
third only to Solitaire and the Blue Screen Of Death in the amount of lost
productivity they cause. Meanwhile, Microsoft Exchange and LookOut! remain
as the number one virus delivery products on the market today.

But maybe not for much longer. A group of disgruntled administrators have
teamed up to produce and sell a brand new way to fight viruses, one that
attacks the root of the problem: stupid users.

Salivating Dogs, Inc. of Ohio has unveiled the "Clue Delivery System"
(CDS), a small device that plugs into the back of a standard PC keyboard
and delivers a mild electric shock whenever the luser does something
stupid. The device is triggered by a Windows program that detects when the
luser attempts to open an unsolicited email attachment or perform another
equally dangerous virus-friendly action.
Lack of money is the root of all evil.
                -- George Bernard Shaw
Actually you would still need the other fixes otherwise you might as well put
the root password in /etc/motd

        - Alan Cox pointing out some security holes in binfmt_misc
You know, if you really do not understand the implications of
running everything with permissions equivalent to root - get
the hell out of any UNIX-related programming until you learn.

        - Al Viro explaining the merits of doing everything as root
And there was much suffering among the people, for g++ was a necessity. And
one rose up from the mass and cried, "Lord Root, if thou canst not help us,
then call upon the gods of far gcc@gcc.gnu.org for among them are sages of
wisdom who may be of help!"

        - bug report from Sean Callanan send to the GCC mailing list
The valley spirit never dies;
It is the woman, primal mother.
Her gateway is the root of heaven and Earth.
It is like a veil barely seen.
Use it; it will never fail.
The heavy is the root of the light.
The still is the master of unrest.

Therefore the sage, traveling all day,
Does not lose sight of his baggage.
Though there are beautiful things to be seen,
He remains unattached and calm.

Why should the lord of ten thousand chariots act lightly in public?
To be light is to lose one's root.
To be restless is to lose one's control.
These things from ancient times arise from one:
The sky is whole and clear.
The earth is whole and firm.
The spirit is whole and strong.
The valley is whole and full.
The ten thousand things are whole and alive.
Kings and lords are whole, and the country is upright.
All these are in virtue of wholeness.

The clarity of the sky prevents its falling.
The firmness of the earth prevents its splitting.
The strength of the spirit prevents its being used up.
The fullness of the valley prevents its running dry.
The growth of the ten thousand things prevents their drying out.
The leadership of kings and lords prevents the downfall of the country.

Therefore the humble is the root of the noble.
The low is the foundation of the high.
Princes and lords consider themselves "orphaned", "widowed" and "worthless".
Do they not depend on being humble?

Too much success is not an advantage.
Do not tinkle like jade
Or clatter like stone chimes.
Hodie natus est radici frater.

[ Unto the root is born a brother ]
<Flood> netgod: I also have a "Evil Inside" T-shirt (w/ Intel logo).. on
        the back it states: "When the rapture comes, will you have root?"
"I wonder if this is the first constitution in the history of mankind
where you have to calculate a square root to determine if a motion
passes.  :-)"
        -- Seen on Slashdot
<Overfiend> xhost +localhost should only be done by people who would
            paint their hostname and root password on an interstate
            overpass.
<netgod> my client has been owned severely
<netgod> this guy got root, ran packet sniffers, installed .rhosts and
         backdoors, put a whole new dir in called /lib/"   ", which has a
         full suite of smurfing and killing tools
<netgod> the only mistake was not deleting the logfiles
<netgod> question is how was root hacked, and that i couldnt tell u
<netgod> it is, of course, not a debian box
* netgod notes the debian box is the only one left untouched by the hacker
         -- wonder why
<Knghtbrd> it's 6am.  I have been up 24 hours
<Knghtbrd> Wake me up and risk life and limb.
* Knghtbrd &; sleep
<Tv> Okay everyone, we wait 10 minutes and then start flooding Knghtbrd
     with ^G's. Someone, hack root and cat /dev/urandom >/dev/dsp.
The root of all superstition is that men observe when a thing hits,
but not when it misses.
                -- Francis Bacon
The state of some commercial Un*x is more unsecure than any Linux box
without a root password...
        -- Bernd Eckenfels
The easiest way to get the root password is to become system admin.
        -- Unknown source
Well, since MS cant be sure of the username of someone downloading
things, they are going to play it safe and have everything dowloaded
and executed by Explorer as suid root. That way, it will run on ANY
system anywhere. :)
        -- George Bonser <grep@cris.com>
The first is to ensure your partner understands that nature has root
privileges - nature doesn't have to make sense.
        -- Telsa Gwynne
Remember: While root can do most everything, there are certain
privileges that only a partner can grant.
        -- Telsa Gwynne
A committee takes root and grows, it flowers, wilts and dies, scattering the
seed from which other committees will bloom.
                -- Parkinson
Money is the root of all evil, and man needs roots.
Money is the root of all wealth.
So you think that money is the root of all evil.  Have you ever asked what
is the root of money?
                -- Ayn Rand
if (rsfp = mypopen("/bin/mail root","w")) {     /* heh, heh */
             -- Larry Wall in perl.c from the perl source code
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners