DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
user
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

Be warned that typing \fBkillall \fIname\fP may not have the desired
effect on non-Linux systems, especially when done by a privileged user.
(From the killall manual page)
But what can you do with it?  -- ubiquitous cry from Linux-user partner.
(Submitted by Andy Pearce, ajp@hpopd.pwd.hp.com)
"Linux: the operating system with a CLUE...
Command Line User Environment".
(seen in a posting in comp.software.testing)
Once upon a time there was a DOS user who saw Unix, and saw that it was
good. After typing cp on his DOS machine at home, he downloaded GNU's
unix tools ported to DOS and installed them. He rm'd, cp'd, and mv'd
happily for many days, and upon finding elvis, he vi'd and was happy. After
a long day at work (on a Unix box) he came home, started editing a file,
and couldn't figure out why he couldn't suspend vi (w/ ctrl-z) to do
a compile.
(By ewt@tipper.oit.unc.edu (Erik Troan)
(l)user error
user to computer ratio too high.
user to computer ration too low.
User was distributing pornography on server; system seized by FBI.
BNC (brain not  (user brain not connected)
UBNC (user brain not connected)
pseudo-user on a pseudo-terminal
Bad user karma.
error: one bad user found in front of screen
        A program should be light and agile, its subroutines connected like a
strings of pearls.  The spirit and intent of the program should be retained
throughout.  There should be neither too little nor too much, neither needless
loops nor useless variables, neither lack of structure nor overwhelming
rigidity.
        A program should follow the 'Law of Least Astonishment'.  What is this
law?  It is simply that the program should always respond to the user in the
way that astonishes him least.
        A program, no matter how complex, should act as a single unit.  The
program should be directed by the logic within rather than by outward
appearances.
        If the program fails in these requirements, it will be in a state of
disorder and confusion.  The only way to correct this is to rewrite the
program.
                -- Geoffrey James, "The Tao of Programming"
===  ALL USERS PLEASE NOTE  ========================

The garbage collector now works.  In addition a new, experimental garbage
collection algorithm has been installed.  With SI:%DSK-GC-QLX-BITS set to 17,
(NOT the default) the old garbage collection algorithm remains in force; when
virtual storage is filled, the machine cold boots itself.  With SI:%DSK-GC-
QLX-BITS set to 23, the new garbage collector is enabled.  Unlike most garbage
collectors, the new gc starts its mark phase from the mind of the user, rather
than from the obarray.  This allows the garbage collection of significantly
more Qs.  As the garbage collector runs, it may ask you something like "Do you
remember what SI:RDTBL-TRANS does?", and if you can't give a reasonable answer
in thirty seconds, the symbol becomes a candidate for GCing.  The variable
SI:%GC-QLX-LUSER-TM governs how long the GC waits before timing out the user.
Congratulations!  You are the one-millionth user to log into our system.
If there's anything special we can do for you, anything at all, don't
hesitate to ask!
        Cosmotronic Software Unlimited Inc. does not warrant that the
functions contained in the program will meet your requirements or that
the operation of the program will be uninterrupted or error-free.
        However, Cosmotronic Software Unlimited Inc. warrants the
diskette(s) on which the program is furnished to be of black color and
square shape under normal use for a period of ninety (90) days from the
date of purchase.
        NOTE: IN NO EVENT WILL COSMOTRONIC SOFTWARE UNLIMITED OR ITS
DISTRIBUTORS AND THEIR DEALERS BE LIABLE TO YOU FOR ANY DAMAGES, INCLUDING
ANY LOST PROFIT, LOST SAVINGS, LOST PATIENCE OR OTHER INCIDENTAL OR
CONSEQUENTIAL DAMAGES.
                -- Horstmann Software Design, the "ChiWriter" user manual
Each new user of a new system uncovers a new class of bugs.
                -- Kernighan
If it has syntax, it isn't user friendly.
        If the Tao is great, then the operating system is great.  If the
operating system is great, then the compiler is great.  If the compiler
is great, then the application is great.  If the application is great, then
the user is pleased and there is harmony in the world.
        The Tao gave birth to machine language.  Machine language gave birth
to the assembler.
        The assembler gave birth to the compiler.  Now there are ten thousand
languages.
        Each language has its purpose, however humble.  Each language
expresses the Yin and Yang of software.  Each language has its place within
the Tao.
        But do not program in COBOL if you can avoid it.
                -- Geoffrey James, "The Tao of Programming"
        It is a period of system war.  User programs, striking from a hidden
directory, have won their first victory against the evil Administrative Empire.
During the battle, User spies managed to steal secret source code to the
Empire's ultimate program: the Are-Em Star, a privileged root program with
enough power to destroy an entire file structure.  Pursued by the Empire's
sinister audit trail, Princess _LPA0 races ~ aboard her shell script,
custodian of the stolen listings that could save her people, and restore
freedom and games to the network...
                -- DECWARS
Know Thy User.
MAC user's dynamic debugging list evaluator?  Never heard of that.
Marvelous!  The super-user's going to boot me!
What a finely tuned response to the situation!
NOTE: No warranties, either express or implied, are hereby given. All
software is supplied as is, without guarantee.  The user assumes all
responsibility for damages resulting from the use of these features,
including, but not limited to, frustration, disgust, system abends, disk
head-crashes, general malfeasance, floods, fires, shark attack, nerve
gas, locust infestation, cyclones, hurricanes, tsunamis, local
electromagnetic disruptions, hydraulic brake system failure, invasion,
hashing collisions, normal wear and tear of friction surfaces, comic
radiation, inadvertent destruction of sensitive electronic components,
windstorms, the Riders of Nazgul, infuriated chickens, malfunctioning
mechanical or electrical sexual devices, premature activation of the
distant early warning system, peasant uprisings, halitosis, artillery
bombardment, explosions, cave-ins, and/or frogs falling from the sky.
Our OS who art in CPU, UNIX be thy name.
        Thy programs run, thy syscalls done,
        In kernel as it is in user!
Remember, God could only create the world in 6 days because he didn't
have an established user base.
Sendmail may be safely run set-user-id to root.
                -- Eric Allman, "Sendmail Installation Guide"
Slowly and surely the unix crept up on the Nintendo user ...
Software suppliers are trying to make their software packages more
"user-friendly".  ...  Their best approach, so far, has been to take all
the old brochures, and stamp the words, "user-friendly" on the cover.
                -- Bill Gates, Microsoft, Inc.
        [Pot. Kettle. Black.]
        Something mysterious is formed, born in the silent void.  Waiting
alone and unmoving, it is at once still and yet in constant motion.  It is
the source of all programs.  I do not know its name, so I will call it the
Tao of Programming.
        If the Tao is great, then the operating system is great.  If the
operating system is great, then the compiler is great.  If the compiler is
greater, then the applications is great.  The user is pleased and there is
harmony in the world.
        The Tao of Programming flows far away and returns on the wind of
morning.
                -- Geoffrey James, "The Tao of Programming"
The bugs you have to avoid are the ones that give the user not only
the inclination to get on a plane, but also the time.
                -- Kay Bostic
The Gurus of Unix Meeting of Minds (GUMM) takes place Wednesday, April
1, 2076 (check THAT in your perpetual calendar program), 14 feet above
the ground directly in front of the Milpitas Gumps.  Members will grep
each other by the hand (after intro), yacc a lot, smoke filtered
chroots in pipes, chown with forks, use the wc (unless uuclean), fseek
nice zombie processes, strip, and sleep, but not, we hope, od.  Three
days will be devoted to discussion of the ramifications of whodo.  Two
seconds have been allotted for a complete rundown of all the user-
friendly features of Unix.  Seminars include "Everything You Know is
Wrong", led by Tom Kempson, "Batman or Cat:man?" led by Richie Dennis
"cc C?  Si!  Si!" led by Kerwin Bernighan, and "Document Unix, Are You
Kidding?" led by Jan Yeats.  No Reader Service No. is necessary because
all GUGUs (Gurus of Unix Group of Users) already know everything we
could tell them.
                -- "Get GUMMed," Dr. Dobb's Journal, June '84
        THE LESSER-KNOWN PROGRAMMING LANGUAGES #14 -- VALGOL

        VALGOL is enjoying a dramatic surge of popularity across the
industry.  VALGOL commands include REALLY, LIKE, WELL, and Y*KNOW.
Variables are assigned with the =LIKE and =TOTALLY operators.  Other
operators include the "California booleans", AX and NOWAY.  Loops are
accomplished with the FOR SURE construct.  A simple example:

        LIKE, Y*KNOW(I MEAN)START
        IF PIZZA        =LIKE BITCHEN AND
        GUY                =LIKE TUBULAR AND
        VALLEY GIRL        =LIKE GRODY**MAX(FERSURE)**2
        THEN
                FOR I =LIKE 1 TO OH*MAYBE 100
                        DO*WAH - (DITTY**2); BARF(I)=TOTALLY GROSS(OUT)
                SURE
        LIKE, BAG THIS PROGRAM; REALLY; LIKE TOTALLY(Y*KNOW); IM*SURE
        GOTO THE MALL

        VALGOL is also characterized by its unfriendly error messages.  For
example, when the user makes a syntax error, the interpreter displays the
message GAG ME WITH A SPOON!  A successful compile may be termed MAXIMALLY
AWESOME!
        The Magician of the Ivory Tower brought his latest invention for the
master programmer to examine.  The magician wheeled a large black box into the
master's office while the master waited in silence.
        "This is an integrated, distributed, general-purpose workstation,"
began the magician, "ergonomically designed with a proprietary operating
system, sixth generation languages, and multiple state of the art user
interfaces.  It took my assistants several hundred man years to construct.
Is it not amazing?"
        The master raised his eyebrows slightly. "It is indeed amazing," he
said.
        "Corporate Headquarters has commanded," continued the magician, "that
everyone use this workstation as a platform for new programs.  Do you agree
to this?"
        "Certainly," replied the master, "I will have it transported to the
data center immediately!"  And the magician returned to his tower, well
pleased.
        Several days later, a novice wandered into the office of the master
programmer and said, "I cannot find the listing for my new program.  Do
you know where it might be?"
        "Yes," replied the master, "the listings are stacked on the platform
in the data center."
                -- Geoffrey James, "The Tao of Programming"
The program isn't debugged until the last user is dead.
Too often people have come to me and said, "If I had just one wish for
anything in all the world, I would wish for more user-defined equations
in the HP-51820A Waveform Generator Software."
                -- Instrument News
                [Once is too often.  Ed.]
                                UNIX Trix

For those of you in the reseller business, here is a helpful tip that will
save your support staff a few hours of precious time.  Before you send your
next machine out to an untrained client, change the permissions on /etc/passwd
to 666 and make sure there is a copy somewhere on the disk.  Now when they
forget the root password, you can easily login as an ordinary user and correct
the damage.  Having a bootable tape (for larger machines) is not a bad idea
either.  If you need some help, give us a call.
                -- CommUNIXque 1:1, ASCAR Business Systems
User hostile.
VMS Beer: Requires minimal user interaction, except for popping the top
and sipping.  However cans have been known on occasion to explode, or
contain extremely un-beer-like contents.
        "Well," said Programmer, "the customary procedure in such cases is
as follows."
        "What does Crustimoney Proseedcake mean?" said End-user.  "For I am
an End-user of Very Little Brain, and long words bother me."
        "It means the Thing to Do."
        "As long as it means that, I don't mind," said End-user humbly.

        [with apologies to A.A. Milne]
X windows:
        It's not how slow you make it.  It's how you make it slow.
        The windowing system preferred by masochists 3 to 1.
        Built to take on the world... and lose!
        Don't try it 'til you've knocked it.
        Power tools for Power Fools.
        Putting new limits on productivity.
        The closer you look, the cruftier we look.
        Design by counterexample.
        A new level of software disintegration.
        No hardware is safe.
        Do your time.
        Rationalization, not realization.
        Old-world software cruftsmanship at its finest.
        Gratuitous incompatibility.
        Your mother.
        THE user interference management system.
        You can't argue with failure.
        You haven't died 'til you've used it.

The environment of today... tomorrow!
        X windows.
You had mail, but the super-user read it, and deleted it!
No user-servicable parts inside.  Refer to qualified service personnel.
Each team building another component has been using the most recent tested
version of the integrated system as a test bed for debugging its piece.  Their
work will be set back by having that test bed change under them.  Of course it
must.  But the changes need to be quantized.  Then each user has periods of
productive stability, interrupted by bursts of test-bed change.  This seems
to be much less disruptive than a constant rippling and trembling.
- Frederick Brooks Jr., "The Mythical Man Month"
A comment on schedules:
Ok, how long will it take?    
   For each manager involved in initial meetings add one month.
   For each manager who says "data flow analysis" add another month.
   For each unique end-user type add one month.
   For each unknown software package to be employed add two months.
   For each unknown hardware device add two months.
   For each 100 miles between developer and installation add one month.
   For each type of communication channel add one month.
   If an IBM mainframe shop is involved and you are working on a non-IBM
      system add 6 months.
   If an IBM mainframe shop is involved and you are working on an IBM
      system add 9 months.
Round up to the nearest half-year.
--Brad Sherman
By the way, ALL software projects are done by iterative prototyping.
Some companies call their prototypes "releases", that's all.
Priority:
        A statement of the importance of a user or a program.  Often
        expressed as a relative priority, indicating that the user doesn't
        care when the work is completed so long as he is treated less
        badly than someone else.
User n.:
        A programmer who will believe anything you tell him.
user, n.:
        The word computer professionals use when they mean "idiot."
                -- Dave Barry, "Claw Your Way to the Top"

[I always thought "computer professional" was the phrase hackers used
when they meant "idiot."  Ed.]
VMS, n.:
        The world's foremost multi-user adventure game.
Wombat's Laws of Computer Selection:
        (1) If it doesn't run Unix, forget it.
        (2) Any computer design over 10 years old is obsolete.
        (3) Anything made by IBM is junk. (See number 2)
        (4) The minimum acceptable CPU power for a single user is a
            VAX/780 with a floating point accelerator.
        (5) Any computer with a mouse is worthless.
                -- Rich Kulawiec
Q:        How many hardware engineers does it take to change a light bulb?
A:        None.  We'll fix it in software.

Q:        How many system programmers does it take to change a light bulb?
A:        None.  The application can work around it.

Q:        How many software engineers does it take to change a light bulb?
A:        None.  We'll document it in the manual.

Q:        How many tech writers does it take to change a light bulb?
A:        None.  The user can figure it out.
Q:        What's tiny and yellow and very, very, dangerous?
A:        A canary with the super-user password.
                Hard Copies and Chmod

And everyone thinks computers are impersonal
cold diskdrives hardware monitors
user-hostile software

of course they're only bits and bytes
and characters and strings
and files

just some old textfiles from my old boyfriend
telling me he loves me and
he'll take care of me

simply a discarded printout of a friend's directory
deep intimate secrets and
how he doesn't trust me

couldn't hurt me more if they were scented in lavender or mould
on personal stationery
                -- terri@csd4.milw.wisc.edu
When license fees are too high,
users do things by hand.
When the management is too intrusive,
users lose their spirit.

Hack for the user's benefit.
Trust them; leave them alone.
When users see one GUI as beautiful,
other user interfaces become ugly.
When users see some programs as winners,
other programs become lossage.

Pointers and NULLs reference each other.
High level and assembler depend on each other.
Double and float cast to each other.
High-endian and low-endian define each other.
While and until follow each other.

Therefore the Guru
programs without doing anything
and teaches without saying anything.
Warnings arise and he lets them come;
processes are swapped and he lets them go.
He has but doesn't possess,
acts but doesn't expect.
When his work is done, he deletes it.
That is why it lasts forever.
When you overesteem great hackers,
more users become cretins.
When you develop encryption,
more users become crackers.

The Guru leads
by emptying user's minds
and increasing their quotas,
by weakening their ambition
and toughening their resolve.
When users lack knowledge and desire,
management will not try to interfere.

Practice not-looping,
and everything will fall into place.
The fortune program is supported, in part, by user contributions and by
a major grant from the National Endowment for the Inanities.
THIS IS PLEDGE WEEK FOR THE FORTUNE PROGRAM

If you like the fortune program, why not support it now with your
contribution of a pithy fortunes, clean or obscene?  We cannot continue
without your support.  Less than 14% of all fortune users are contributors.
That means that 86% of you are getting a free ride.  We can't go on like
this much longer.  Federal cutbacks mean less money for fortunes, and unless
user contributions increase to make up the difference, the fortune program
will have to shut down between midnight and 8 a.m.  Don't let this happen.
Mail your fortunes right now to "fortune".  Just type in your favorite pithy
saying.  Do it now before you forget.  Our target is 300 new fortunes by the
end of the week. Don't miss out.  All fortunes will be acknowledged.  If you
contribute 30 fortunes or more, you will receive a free subscription to "The
Fortune Hunter", our monthly program guide.  If you contribute 50 or more,
you will receive a free "Fortune Hunter" coffee mug ....
"But the most reliable indication of the future of Open Source is its past: in just a few years, we have gone from nothing to a robust body of software that solves many different problems and is reaching the million-user count. There's no reason for us to slow down now."

  -- Bruce Perens, on the future of Open Source software. (Open Sources, 1999 O'Reilly and Associates)
If Windows is so user-friendly, then why do you need a 678-page manual?
Bill Gates is surfing the Internet, collecting the URLs of anti-Micrsoft
websites to send to the legal department for possible libel lawsuits. Suddenly
the devil appears, and says, "Bill, I've got a deal for you. I will turn
Microsoft into a complete software monopoly. Every computer will run Windows.
Every user will be forced to buy Microsoft software. The Justice Department
will look the other way. Everyone will love you. You only have to do one thing:
give me your soul." Bill Gates looks at him and replies, "Ok, sure. But what's
the catch?"
Linux: the operating system with a CLUE... Command Line User Environment
Windows: The first user interface where you click Start to turn it off.

   -- From a Slashdot.org post
Missouri Town Changes Name to 'Linux'

LINUX, MO -- The small Missouri town of Linn, county seat of Osage County,
announced yesterday that it will be henceforth called 'Linux'. Mayor Bob Farrow
said, "Linn needed something to put it on the map. A few weeks ago my daughter
mentioned that she installed Linux on her computer and how great she thought it
was. I thought to myself, 'Self, changing the town's name to 'Linux' could be
an opportunity to attract attention -- and money -- to our town. We could even
hold a Linux Convention at the community center.' So I approached the city
council about the idea, and they loved it. The rest is history."

Farrow's daughter is organizing the Linux Linux User Group. She hopes to be
able to hold a Linux Convention this fall. "The Linn, er, Linux community
center probably won't be big enough, we'll probably have to hold it in nearby
Jefferson City," she said.

The mayor does have one reservation. "How the hell do you pronounce Linux?" One
of the mayor's contenders in the next election, Mr. Noah Morals, says he will
start an ad campaign calling Bob Farrow "the Incumbent Liar of LIE-nucks".
Needless to say, the mayor usually pronounces Linux as "LIH-nucks".
Microsoft ActivePromo Campaign: "Windows Competitive Upgrade Offer"

Microsoft's PR masterminds are planning a massive marketing campaign,
code-named "ActivePromo 2000", to promote the upcoming release of Windows
2000 (scheduled for February 2001).  This marketing campaign will include a
"Windows Competitive Upgrade Offer" promotion.

Users of non-Microsoft operating systems (Linux in particular) will be given
the opportunity to trade-in their present OS for a free copy of Windows 98
(or NT 4.0) and Office 97.  People (all three of them) who want to
participate in this program will have to:

1. Mail their operating system's floppy disks or CD-ROMs to Microsoft

2. Agree to a two year contract with the Microsoft Network.

3. Agree (in writing) to the Competitive Upgrade License Agreement; one of
the terms of which is that the user may not install, copy, or otherwise use
a non-Microsoft OS for five years.
Attack of the Tuxissa Virus

What started out as a prank posting to comp.os.linux.advocacy yesterday has
turned into one of the most significant viruses in computing history.
The creator of the virus, who goes by the moniker "Anonymous Longhair",
modified the Melissa virus to install Linux on infected machines.

"It's a work of art," one Linux advocate told Humorix after he looked
through the Tuxissa virus source code.  "This virus goes well beyond the
feeble troublemaking of Melissa.  It actually configures a UMSDOS partition
on the user's hard drive and then downloads and installs a stripped-down
version of Slackware Linux."

The email message that the virus is attached to has the subject "Important
Message About Windows Security".  The text of the body says, "I want to let
you know about some security problems I've uncovered in Windows 95/98/NT,
Office 95/97, and Outlook. It's critically important that you protect your
system against these attacks.  Visit these sites for more information..."
The rest of the message contains 42 links to sites about Linux and free
software.

Details on how the virus started are a bit sketchy.  The "Anonymous
Longhair" who created it only posted it to Usenet as an early April Fool's
gag, demonstrating how easy it would be to mount a "Linux revolution".
Invasion of the Dancing Penguin

Those annoying, dancing cartoon characters embedded in software applications
are no longer confined to Microsoft programs.  They have entered the realm
of Linux.  A new Linux distribution under development, called LinTux,
promises to provide a more "user-friendly" environment through its "Dancing
Penguin" assistant.

Dancing Tux will "guide" users through the installation process and will be
a permanent fixture of the X root window.  The LinTux staff demonstrated a
prototype version of the Dancing Tux program to this Humorix reporter.  It
was certainly impressive, but, like the Dancing Paper Clip in Microsoft
Office, it becomes annoying very fast.

The one redeeming feature of LinTux is that, when the system is idle,
Dancing Tux becomes a make-shift screen saver.  The animations included in
the prototype were quite amusing.  For instance, in one scene, Tux chases
Bill Gates through an Antarctic backdrop.  In another animation, Tux can be
seen drinking beers with his penguin pals and telling Microsoft jokes.
BSOD Simulator

Users of Red Hat 6.0 are discovering a new feature that hasn't been widely
advertised: a Blue Screen of Death simulator.  By default, the bsodsim
program activates when the user hits the virtually unused SysRq key (this is
customizable) causing the system to switch to a character cell console to
display a ficticious Blue Screen.

Red Hat hails the bsodsim program as the "boss key" for the Linux world. One
RH engineer said, "Workers are smuggling Linux boxes into companies that
exclusively use Windows.  This is all good and well until the PHB walks by
and comments, 'That doesn't look like Windows...' With bsodsim, that problem
is solved.  The worker can hit the emergency SysRq key, and the system will
behave just like Windows..."

The bsodsim program doesn't stop at just showing a simulated error message.
If the boss doesn't walk away, the worker can continue the illusion by
hitting CTRL-ALT-DEL, which causes a simulated reboot.  After showing the
usual boot messages, bsodsim will run a simulated SCANDISK program
indefinitely. The boss won't be able to tell the difference.  If the boss
continues to hang around, the worker can say, "SCANDISK is really taking a
long time... maybe we should upgrade our computers.  And don't you have
something better to do than watch this computer reboot for the tenth time
today?"
Jargon Coiner (#1)

An irregular feature that aims to give you advance warning of new jargon
that we've just made up.

* WINCURSE: Loud expletive uttered when a Linux user comes face-to-face
  with a computer containing a WinModem.

  Example: "Eric wincursed when his mother showed him the new computer she
  bought from CompUSSR... which contained a WinModem and a WinSoundCard."

* WIND'OH KEY: Nickname given to the three useless Windows keys that come
  on virtually all new keyboards. These keys are often hit by mistake
  instead of CTRL or ALT, causing the user to shout "D'oh!"

* DE-WIND'OH!ED KEYBOARD: (1) A new keyboard produced without any wind'oh!
  keys or a "Enhanced for Windows 95/98" logo. Extremely rare. (2) A
  keyboard in which the wind'oh! keys have been physically removed.
Jargon Coiner (#9)

An irregular feature that aims to give you advance warning of new jargon
that we've just made up.

* RHYMES WITH CYNICS: The final answer to any debate about how to
  pronounce Linux. Of course, "cynics" might not be the best word to
  associate Linux with...

* WISL? (Will It Support Linux?): The very first thought that springs into
  a Linux user's mind when a cool new piece of software or hardware is
  announced.

* JJMD! (Jar Jar Must Die!): Meaningless reply given to a question or poll
  for which you don't have a good answer.

  Example: Question: "When did you stop beating your wife?"
           Answer: "JJMD!"
Jargon Coiner (#10)

An irregular feature that aims to give you advance warning of new jargon
that we've just made up.

* HOBTOB (Hanging Out By The O'Reilly Books): Seeking free Linux technical
  support at a bookstore by waiting near the computer books for a geek to
  come by and then casually asking them for help.

* MOOLA (Marketing Officially Organizes Linux Adoptance):  A press release
  issued by a Dot Com (or Dot Con?) heralding their "support" for Linux
  (i.e. "BigPortal.com adopts Linux as their official operating system by
  adding five Linux-related links to their BigDirectory"); used to inflate
  their stock price and rake in moola even though none of their employees
  have ever used Linux and don't really care.
  
* KARMA KOLLECTOR: Slashdot user who treats the acquisition of "karma" as
  a game; often has a detailed strategy on how to sucker moderators into
  raising the score of their posts (i.e. posting a comment with a title
  like "Microsoft Sucks!!! (Score 3, Insightful)" or using "Only a fool
  would moderate this down" as a signature). See also "Karma Whore".
Jargon Coiner (#12)

An irregular feature that aims to give you advance warning of new jargon
that we've just made up.

* IPO (I've Patented the Obvious): Acquiring patents on trivial things and
  then hitting other companies over the head with them.

  Example: "Amazon just IPO'd one-click spam and is now ready to sue B&N."

* IPO (I'm Pissed Off): Exclamation given by a Linux user who was unable
  to participate in a highly lucrative Linux IPO due to lack of capital or
  E*Trade problems. Also uttered by Linux hackers who did not receive The
  Letter from Red Hat or VA Linux even though their friends did.
  
* YAKBA (Yet Another Killer Backhoe Attack): The acronym that describes
  network outtages caused by a careless backhoe operator.

  Examples: "Don't blame us, our website was offline after we suffered a
  YAKBA". "Don't worry about Y2K, what we need to think about is
  YAKBA-compliance."
Evolution Of A Linux User: The 11 Stages Towards Getting A Life

0. Microserf - Your life revolves around Windows and you worship Bill
   Gates and his innovative company.
1. Fear, Uncertainty, Doubt... About Microsoft - You encounter a growing
   number of problems with Microsoft solutions, shaking your world-view
2. FUD... About Linux - After hearing about this new Linux thing, you
   take the plunge, but are unimpressed by the nerdware OS.
3. Born-Again Microserf - You rededicate your life to Microsoft worship
4. Disgruntled User - Microsoft software keeps screwing you over,
   and you're not going to take it anymore!
5. A Religious Experience - You successfully install Linux, and are
   left breathless at its elegance. No more Windows for you!
6. Linux Convert - You continue to fall in love with the new system
7. Linux Zealot - You dedicate your life to Linux World Domination...
   and it shows! You go beyond mere advocacy to sheer zealotry.
8. Back To Reality - Forces out of your control compel you to
   return to using Windows and Office
9. Enlightened Linux User - You become 100% Microsoft free after finding
   ways to overcome the need for Microsoft bloatware
10.Get A Life - You become a millionaire after your Linux portal is
   acquired; you move to a small tropical island and get a life
What I'd like to see is a prohibition on Microsoft incorporating
multi-megabyte Easter Eggs and other stupid bloatware into Windows and
Office. A typical computer with pre-installed Microsoft shoveware probably
only has about 3 megabytes of hard drive space free because of flight
simulators, pinball games, and multimedia credits Easter Eggs that nobody
wants. I predict that if Microsoft is ever forced to remove these things,
the typical user will actually be able to purchase competing software now
that they have some free space to put it on. Of course, stock in hard
drive companies might plummet...

   -- Anonymous Coward, when asked by Humorix for his reaction
      to the proposed Microsoft two-way split
Right now hundreds of Anonymous Cowards are cheering the fact that only
Windows boobs are victims of ILOVEYOU and other email viruses. I realize
Outlook is so insecure that using it is like posting a sign outside your
door saying, "DOOR UNLOCKED -- ROB ME!". However, Linux isn't immune. If I
had a dollar for every pine buffer overflow uncovered, I could buy a
truckload of fresh herring.

I expect the next mass email virus to spread will be cross-platform. If
the recipient is a Windows/Outlook luser, they'll get hit. If the
recipient is a Linux/pine user, they'll find themselves staring at a
self-executing bash script that's has just allocated 1 petabyte of memory
and crashed the system (or worse).

Either that or the next mass email virus will only damage Linux systems. I
can just see Bill Gates assigning some junior programmer that very task.
Be afraid. Be very afraid.

   -- A speech given at the First Annual Connecticut Conspiracy]
      Convention (ConConCon) by an anonymous creature said to
      be "wearing what appeared to be a tuxedo".
Elite Nerds Create Linux Distro From Hell

HELL, MICHIGAN -- A group of long-time Linux zealots and newbie haters
have thrown together a new Linux distro called Hellix that is so
user-hostile, so anti-newbie, so cryptic, and so old-fashioned that it
actually makes MS-DOS look like a real operating system. Said the founder
of the project, "I'm sick and tired of the Windowsification of the Linux
desktop in a fruitless attempt to make the system more appealing to
newbies, PHBs, and MCSEs. Linux has always been for nerds only, and we
want to make sure it stays that way!"

One of the other Bastard Distributors From Hell explained, "In the last
five years think of all the hacking effort spent on Linux... and for what?
We have nothing to show for it but half-finished Windows-like desktops, vi
dancing paperclips, and graphical front-ends to configuration files. Real
nerds use text files for configuration, darnit, and they like it! It's
time to take a stand against the hordes of newbies that are polluting our
exclusive operating system."

One Anonymous Coward said, "This is so cool... It's just like Unix back in
the good old days of the 70's when men were men and the only intuitive
interface was still the nipple."
Brief History Of Linux (#4)
Walls & Windows

Most people don't realize that many of the technological innovations taken
for granted in the 20th Century date back centuries ago. The concept of a
network "firewall", for instance, is a product of the Great Wall of China,
a crude attempt to keep raging forest fires out of Chinese territory. It
was soon discovered that the Wall also kept Asian intruders ("steppe
kiddies") out, just as modern-day firewalls keep network intruders
("script kiddies") out.

Meanwhile, modern terminology for graphical user interfaces originated
from Pre-Columbian peoples in Central and South America. These natives
would drag-and-drop icons (sculptures of the gods) into vast pits of
certain gooey substances during a ritual in which "mice" (musical
instruments that made a strange clicking sound) were played to an eerie
beat.
Brief History Of Linux (#12)
A note from Bill Gates' second grade teacher:

Billy has been having some trouble behaving in class lately... Last Monday
he horded all of the crayons and refused to share, saying that he needed
all 160 colors to maximize his 'innovation'. He then proceeded to sell
little pieces of paper ("End-User License Agreement for Crayons" he called
them) granting his classmates the 'non-transferable right' to use the
crayons on a limited time basis in exchange for their lunch money...

When I tried to stop Billy, he kept harping about his right to innovate
and how my interference violated basic notions of free-market capitalism.
"Holding a monopoly is not illegal," he rebutted. I chastised him for
talking back, and then I took away the box of crayons so others could
share them... angrily, he then pointed to a drawing of his hanging on the
wall and yelled, "That's my picture! You don't have the right to present
my copyrighted material in a public exhibition without my permission!
You're pirating my intellectual property. Pirate! Pirate! Pirate!"

I developed a headache that day that even the maximum dosage of Aspirin
wasn't able to handle. And then on Tuesday, he conned several students out
of their milk money by convincing them to play three-card Monty...
Brief History Of Linux (#13)
Wanted: Eunuchs programmers

Everything you know about the creation of the Unix operating system is
wrong. We have uncovered the truth: Unix was a conspiracy hatched by
Ritchie and Thompson to thwart the AT&T monopoly that they worked for. The
system, code-named EUNUCHS (Electronic UNtrustworthy User-Condemning
Horrible System), was horribly conceived, just as they had planned.

The OS, quickly renamed to a more respectable "Unix", was adopted first by
Ma Bell's Patent Department and then by the rest of the monopoly. AT&T saw
an inexpensive, multi-user, portable operating system that it had all
rights to; the authors, however, saw a horrible, multi-crashing system
that the Evil Ma Bell Empire would become hopelessly dependent on. AT&T
would go bankrupt trying to maintain the system and eventually collapse.

That didn't happen. Ritchie and Thompson were too talented to create a
crappy operating system; no matter how hard they tried the system was too
good. Their last ditch effort to sabotage the system by recoding it
obfuscated C was unsuccessful. Before long Unix spread outside of Bell
Labs and their conspiracy collapsed.
Brief History Of Linux (#18)
There are lies, damned lies, and Microsoft brochures

Even from the very first day, the Microsoft Marketing Department was at
full throttle. Vaporware has always been their weapon of choice. Back when
MS-DOS 1.25 was released to OEMs, Microsoft handed out brochures touting
some of the features to be included in future versions, including:
Xenix-compatible pipes, process forks, multitasking, graphics and cursor
positioning, and multi-user support.

The brochure also stated, "MS-DOS has no practical limit on disk size.
MS-DOS uses 4-byte Xenix compatible pointers for file and disk capacity up
to 4 gigabytes." We would like to emphasize in true Dave Barry fashion
that we are not making this up.

Big vaporous plans were also in store for Microsoft's "Apple Killer"
graphical interface. In 1983 Microsoft innovated a new marketing ploy --
the rigged "smoke-and-mirrors" demo -- to showcase the "overlapping
windows" and "multitasking" features of Interface Manager, the predecessor
to Windows. These features never made it into Windows 1.0 -- which,
incidentally, was released 1.5 years behind schedule.
Brief History Of Linux (#25)

By the mid-1990's the Linux community was burgeoning as countless geeks
fled Redmond monopolistic oppression, Armonk cluelessness, and Cupertino
click-and-drool reality distortion fields. By late 1991 there was an
informal Linux User Group in Finland, although its primary focus was Linux
advocacy, not drinking beer and telling Microsoft jokes as most do today.

Kernel development continued at a steady clip, with more and more people
joining in and hoping that their patches would be accepted by the
Benevolent Dictator himself. To have a patch accepted by Linus was like
winning the Nobel Prize, but to face rejection was like being rejected
from Clown College. The reputation game certainly sparked some flame wars.

One of the most memorable crisis was over the behavior of the delete and
backspace keys. A certain faction of hackers wanted the Backspace key to
actually backspace and the Delete key to actually delete. Linus wasn't too
keen on the proposed changes; "It Works For Me(tm)" is all he said. Some
observers now think Linus was pulling rank to get back at the unknown
hacker who managed to slip a patch by him that replaced the "Kernel panic"
error with "Kernel panic: Linus probably fscked it all up again".
Clippit Charged With Attempted Murder

Microsoft's Dancing Paper Clip turned violent last week and nearly killed
a university student testing a new Windows-based human-computer interface.
The victim is expected to make a full recovery, although psychiatrists
warn that the incident may scar him emotionally for life. "You can bet
this kid won't be using Windows or Office ever again," said one shrink.

The victim had been alpha-testing CHUG (Computer-Human Unencumbered
Groupware), a new interface in which the user controls the computer with
force-feedback gloves and voice activation.

"I was trying to write a term paper in Word," he said from his hospital
bed. "But then that damned Dancing Paper Clip came up and started annoying
me. I gave it the middle finger. It reacted by deleting my document, at
which point I screamed at it and threatened to pull the power cord. I
didn't get a chance; the force-feedback gloves started choking me."

"We told Clippit it had the right to remain silent, and so on," said a
campus police officer. "The paperclip responded, 'Hi, I'm Clippit, the
Office Assistant. Would you like to create a letter?' I said, 'Look here,
Mr. Paperclip. You're being charged with attempted murder.' At that point
the computer bluescreened."
World Domination, One CPU Cycle At A Time

Forget about searching for alien signals or prime numbers. The real
distributed computing application is "Domination@World", a program to advocate
Linux and Apache to every website in the world that uses Windows and IIS.

The goal of the project is to probe every IP number to determine what kind of
platform each Net-connected machine is running. "That's a tall order... we
need lots of computers running our Domination@World clients to help probe
every nook and cranny of the Net," explained Mr. Zell Litt, the project head.

After the probing is complete, the second phase calls for the data to be
cross-referenced with the InterNIC whois database. "This way we'll have the
names, addresses, and phone numbers for every Windows-using system
administrator on the planet," Zell gloated. "That's when the fun begins."

The "fun" part involves LART (Linux Advocacy & Re-education Training), a plan
for extreme advocacy. As part of LART, each Linux User Group will receive a
list of the Windows-using weenies in their region. The LUG will then be able
to employ various advocacy techniques, ranging from a soft-sell approach
(sending the target a free Linux CD in the mail) all the way to "LARTcon 5"
(cracking into their system and forcibly installing Linux).
Press Release -- For Immediate Release
Microsoft Corporation, Redmond, WA

...Virtually all version of Linux (and Unix) contain a security hole that
allows unauthorized users to gain complete control over the machine. By
simply typing "root" at the login prompt and supplying a password from a
limited number of possibilities, a malicious user can easily gain
administrator privileges. This hole can be breached in seconds with only a
dozen or so keystrokes...

We suspect this issue has been known to Red Hat and other Linux
distributors for years and they have refused to acknowlege its existence
or supply a patch preventing users from exploiting the "root" login
loophole...

By ignoring the problem, the Linux community has proven that installing
Linux is a dangerous proposition that could get you fired. We would like
to point out that Windows XP does not suffer from this gaping hole...
Tests conducted by both Ziff-Davis and Mindcraft prove that Windows XP is
indeed the most secure operating system ever produced...
"Please see the posting on l-k today "[NEW DRIVER] New user space serial port"
which does just what you want.  Just-in-time kernel development has arrived."

        - Andreas Dilger
> Is there an API or other means to determine what video card, namely the
> chipset, that the user has installed on his machine?

On a modern X86 machine use the PCI/AGP bus data. On a PS/2 use the MCA bus
data. On nubus use the nubus probe data. On old style ISA bus PCs done a
large pointy hat and spend several years reading arcane and forbidden
scrolls

        - Alan Cox on hardware probing
/* First check any supplied i/o locations. User knows best. <cough> */

        - comment from drivers/net/ne.c
Hope this helps some, sorry for not being able to do a brain dump.

        - Mike Stump helping a clueless user on the gcc mailing list
It has always been the policy that format conversions go in user space.
The kernel is an arbitrator of resources it is not a shit bucket for
solving other peoples incompetence.

        - Alan Cox on linux-kernel
No. Sell the card to a windows user buy a cheap taiwanese mass market ethernet  and spend the rest on the faster CPU. I bet that is more cost effective for
DES performance..

        - Alan Cox not recommending NICs with built-in crypto engines
> That is reimplementing file system functionality in user space.
> I'm in doubts that this is considered good design...

Keeping things out of the kernel is good design. Your block indirections
are no different to other database formats. Perhaps you think we should
have fsql_operation() and libdb in kernel 8)

        - Alan Cox on linux-kernel
Tim Schmielau wrote:
> the appended patch enables 32 bit linux boxes to display more than
> 497.1 days of uptime. No user land application changes are needed.

Thank you for doing this labor of love -

I will let you know how it goes sometime
after March 23, 2003 -

        - J Sloan on linux-kernel
<Knghtbrd> I can think of lots of people who need USER=ID10T someplace!
But modifying dpkg is infeasible, and we've agreed to, among other things,
keep the needs of our users at the forefront of our minds. And from a
user's perspective, something that keeps the system tidy in the normal
case, and works *now*, is much better than idealistic fantasies like a
working dpkg.
        -- Manoj Srivastava
<Deek> If the user points the gun at his foot and pulls the trigger, it
       is our job to ensure the bullet gets where it's supposed to.
This product is meant for educational purposes only.  Any resemblance to real
persons, living or dead is purely coincidental.  Void where prohibited.  Some
assembly may be required.  Batteries not included.  Contents may settle during
shipment.  Use only as directed.  May be too intense for some viewers.  If
condition persists, consult your physician.  No user-serviceable parts inside.
Breaking seal constitutes acceptance of agreement.  Not responsible for direct,
indirect, incidental or consequential damages resulting from any defect, error
or failure to perform.  Slippery when wet.  For office use only.  Substantial
penalty for early withdrawal.  Do not write below this line.  Your cancelled
check is your receipt.  Avoid contact with skin.  Employees and their families
are not eligible.  Beware of dog.  Driver does not carry cash.  Limited time
offer, call now to insure prompt delivery.  Use only in well-ventilated area.
Keep away from fire or flame.  Some equipment shown is optional.  Price does
not include taxes, dealer prep, or delivery.  Penalty for private use.  Call
toll free before digging.  Some of the trademarks mentioned in this product
appear for identification purposes only.  All models over 18 years of age.  Do
not use while operating a motor vehicle or heavy equipment.  Postage will be
paid by addressee.  Apply only to affected area.  One size fits all.  Many
suitcases look alike.  Edited for television.  No solicitors.  Reproduction
strictly prohibited.  Restaurant package, not for resale.  Objects in mirror
are closer than they appear.  Decision of judges is final.  This supersedes
all previous notices.  No other warranty expressed or implied.
Once upon a time there was a DOS user who saw Unix, and saw that it was
good.  After typing cp on his DOS machine at home, he downloaded GNU's
unix tools ported to DOS and installed them.  He rm'd, cp'd, and mv'd
happily for many days, and upon finding elvis, he vi'd and was happy.  After
a long day at work (on a Unix box) he came home, started editing a file,
and couldn't figure out why he couldn't suspend vi (w/ ctrl-z) to do
a compile.
        -- Erik Troan, ewt@tipper.oit.unc.edu
Be warned that typing \fBkillall \fIname\fP may not have the desired
effect on non-Linux systems, especially when done by a privileged user.
        -- From the killall manual page
Linux: the operating system with a CLUE... Command Line User Environment.
        -- seen in a posting in comp.software.testing
But what can you do with it?
        -- ubiquitous cry from Linux-user partner
> Linux is not user-friendly.
It _is_ user-friendly.  It is not ignorant-friendly and idiot-friendly.
        -- Seen somewhere on the net
"... being a Linux user is sort of like living in a house inhabited
by a large family of carpenters and architects. Every morning when
you wake up, the house is a little different. Maybe there is a new
turret, or some walls have moved. Or perhaps someone has temporarily
removed the floor under your bed." - Unix for Dummies, 2nd Edition
        -- found in the .sig of Rob Riggs, rriggs@tesser.com
Win 95 is simplified for the user:

User: What does this configuration thing do?
You: It allows you to modify you settings, for networking,
        hardware, protocols, ...
User: Whoa! Layman's terms, please!
You:  It changes stuff.
User: That's what I'm looking for!  What can it change?
You:  This part change IP forwarding.  It allows ...
User: Simplify, simplify!  What can it do for ME?
You:  Nothing, until you understand it.
User: Well it makes me uncomfortable.  It looks so technical;
      Get rid of it, I want a system *I* can understand.
You:  But...
User: Hey, who's system is this anyway?
You:  (... rm this, rm that, rm /etc/* ...) "All done."
        -- Kevin M. Bealer <kmb203@psu.edu>
Does biff in bo work
coz it biffin doesn't beep
an if biff in bo is broke
then biff in bo I will delete

I've tried biff in bo with 'y'
I've tried biff in bo with '-y'
no biffin output does it show
so poor wee biff is gonna go.
        -- John Spence <jspence@lynx.net.au> on debian-user
I HAVE to buy a new "DODGE MISER" and two dozen JORDACHE JEANS because
my viewscreen is "USER-FRIENDLY"!!
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners