DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
typing
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

Actually, typing random strings in the Finder does the equivalent of
filename completion.
(Discussion in comp.os.linux.misc on the intuitiveness of commands: file
completion vs. the Mac Finder.)
Be warned that typing \fBkillall \fIname\fP may not have the desired
effect on non-Linux systems, especially when done by a privileged user.
(From the killall manual page)
Once upon a time there was a DOS user who saw Unix, and saw that it was
good. After typing cp on his DOS machine at home, he downloaded GNU's
unix tools ported to DOS and installed them. He rm'd, cp'd, and mv'd
happily for many days, and upon finding elvis, he vi'd and was happy. After
a long day at work (on a Unix box) he came home, started editing a file,
and couldn't figure out why he couldn't suspend vi (w/ ctrl-z) to do
a compile.
(By ewt@tipper.oit.unc.edu (Erik Troan)
The Bulwer-Lytton fiction contest is held ever year at San Jose State
Univ.  by Professor Scott Rice.  It is held in memory of Edward George
Earle Bulwer-Lytton (1803-1873), a rather prolific and popular (in his
time) novelist.  He is best known today for having written "The Last
Days of Pompeii."

Whenever Snoopy starts typing his novel from the top of his doghouse,
beginning "It was a dark and stormy night..." he is borrowing from Lord
Bulwer-Lytton.  This was the line that opened his novel, "Paul Clifford,"
written in 1830.  The full line reveals why it is so bad:

        It was a dark and stormy night; the rain fell in torrents -- except
        at occasional intervals, when it was checked by a violent gust of
        wind which swept up the streets (for it is in London that our scene
        lies), rattling along the housetops, and fiercely agitating the scanty
        flame of the lamps that struggled against the darkness.
BASIC is to computer programming as QWERTY is to typing.
                -- Seymour Papert
Okay, Okay -- I admit it.  You didn't change that program that worked
just a little while ago; I inserted some random characters into the
executable.  Please forgive me.  You can recover the file by typing in
the code over again, since I also removed the source.
I am returning this otherwise good typing paper to you because someone
has printed gibberish all over it and put your name at the top.
                -- Professor Lowd, English, Ohio University
The 'A' is for content, the 'minus' is for not typing it.  Don't ever do
this to my eyes again.
                -- Professor Ronald Brady, Philosophy, Ramapo State College
We don't need no indirection                We don't need no compilation
We don't need no flow control                We don't need no load control
No data typing or declarations                No link edit for external bindings
Hey! did you leave the lists alone?        Hey! did you leave that source alone?
Chorus:                                        (Chorus)
        Oh No. It's just a pure LISP function call.

We don't need no side-effecting                We don't need no allocation
We don't need no flow control                We don't need no special-nodes
No global variables for execution        No dark bit-flipping for debugging
Hey! did you leave the args alone?        Hey! did you leave those bits alone?
(Chorus)                                (Chorus)
                -- "Another Glitch in the Call", a la Pink Floyd
I have a dog; I named him Stay.  So when I'd go to call him, I'd say, "Here,
Stay, here..." but he got wise to that.  Now when I call him he ignores me
and just keeps on typing.
                -- Steven Wright
/*
* Hi, this is Linus Torvalds speaking, your Benevolent Dictator. I'm typing
* this today to talk about EyeOpener(tm) brand caffeinated beverages, for
* those really, really, _really_ long nights of kernel hacking.
*
* EyeOpener(tm): When ordinary colas don't keep you awake for 72 hours
* straight.
*/

   -- Comment embedded in Linux kernel 2.6.15 after Linus Torvalds
      decided to get-rich-quick by placing "comment-verts" in the code
The Blue Screen Of Advocacy

The Federal Bureau of Investigation & Privacy Violations has issued a
national advisory warning computer stores to be on the lookout for the
"Bluescreen Bandits". These extreme Linux zealots go from store to store
and from computer to computer typing in "C:\CON\CON" and causing the demo
machines to crash and display the Blue Screen Of Death.

Efforts to apprehend the bandits have so far been unsuccessful. The
outlaws were caught on tape at a CompUSSR location in Southern California,
but in an ironic twist, the surveillance system bluescreened just before
the penguinistas came into clear view.

"We don't have many clues. It's not clear whether a small group is behind
the bluescreen vandalism, or whether hundreds or even thousands of geek
zealots are involved," said the manager of a Capacitor City store.

The manager has good reason to be upset. The bluescreen raid was the top
story in the local newspaper and quickly became a hot topic of discussion.
As a result, the local school board halted its controversial plans to
migrate their computers from Macs to PCs.
Press Release -- For Immediate Release
Microsoft Corporation, Redmond, WA

...Virtually all version of Linux (and Unix) contain a security hole that
allows unauthorized users to gain complete control over the machine. By
simply typing "root" at the login prompt and supplying a password from a
limited number of possibilities, a malicious user can easily gain
administrator privileges. This hole can be breached in seconds with only a
dozen or so keystrokes...

We suspect this issue has been known to Red Hat and other Linux
distributors for years and they have refused to acknowlege its existence
or supply a patch preventing users from exploiting the "root" login
loophole...

By ignoring the problem, the Linux community has proven that installing
Linux is a dangerous proposition that could get you fired. We would like
to point out that Windows XP does not suffer from this gaping hole...
Tests conducted by both Ziff-Davis and Mindcraft prove that Windows XP is
indeed the most secure operating system ever produced...
"After 40 Terabytes, your fingers start to hurt."

        - David Miller on typing
Once upon a time there was a DOS user who saw Unix, and saw that it was
good.  After typing cp on his DOS machine at home, he downloaded GNU's
unix tools ported to DOS and installed them.  He rm'd, cp'd, and mv'd
happily for many days, and upon finding elvis, he vi'd and was happy.  After
a long day at work (on a Unix box) he came home, started editing a file,
and couldn't figure out why he couldn't suspend vi (w/ ctrl-z) to do
a compile.
        -- Erik Troan, ewt@tipper.oit.unc.edu
Be warned that typing \fBkillall \fIname\fP may not have the desired
effect on non-Linux systems, especially when done by a privileged user.
        -- From the killall manual page
Actually, typing random strings in the Finder does the equivalent of
filename completion.
        -- Discussion on file completion vs. the Mac Finder
Boss: You forgot to assign the result of your map!

Hacker: Dang, I'm always forgetting my assignations...

Boss: And what's that "goto" doing there?!?

Hacker: Er, I guess my finger slipped when I was typing "getservbyport"...

Boss: Ah well, accidents will happen.  Maybe we should have picked APL.
             -- Larry Wall in <199710311732.JAA19169@wall.org>
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners