Proverbs, aphorisms, quotations (English) | by Linux fortune |
Be warned that typing \fBkillall \fIname\fP may not have the desired effect on non-Linux systems, especially when done by a privileged user. (From the killall manual page) | |
But what can you do with it? -- ubiquitous cry from Linux-user partner. (Submitted by Andy Pearce, ajp@hpopd.pwd.hp.com) | |
"Linux: the operating system with a CLUE... Command Line User Environment". (seen in a posting in comp.software.testing) | |
Once upon a time there was a DOS user who saw Unix, and saw that it was good. After typing cp on his DOS machine at home, he downloaded GNU's unix tools ported to DOS and installed them. He rm'd, cp'd, and mv'd happily for many days, and upon finding elvis, he vi'd and was happy. After a long day at work (on a Unix box) he came home, started editing a file, and couldn't figure out why he couldn't suspend vi (w/ ctrl-z) to do a compile. (By ewt@tipper.oit.unc.edu (Erik Troan) | |
(l)user error | |
user to computer ratio too high. | |
user to computer ration too low. | |
User was distributing pornography on server; system seized by FBI. | |
BNC (brain not (user brain not connected) | |
UBNC (user brain not connected) | |
pseudo-user on a pseudo-terminal | |
Bad user karma. | |
error: one bad user found in front of screen | |
A program should be light and agile, its subroutines connected like a strings of pearls. The spirit and intent of the program should be retained throughout. There should be neither too little nor too much, neither needless loops nor useless variables, neither lack of structure nor overwhelming rigidity. A program should follow the 'Law of Least Astonishment'. What is this law? It is simply that the program should always respond to the user in the way that astonishes him least. A program, no matter how complex, should act as a single unit. The program should be directed by the logic within rather than by outward appearances. If the program fails in these requirements, it will be in a state of disorder and confusion. The only way to correct this is to rewrite the program. -- Geoffrey James, "The Tao of Programming" | |
=== ALL USERS PLEASE NOTE ======================== The garbage collector now works. In addition a new, experimental garbage collection algorithm has been installed. With SI:%DSK-GC-QLX-BITS set to 17, (NOT the default) the old garbage collection algorithm remains in force; when virtual storage is filled, the machine cold boots itself. With SI:%DSK-GC- QLX-BITS set to 23, the new garbage collector is enabled. Unlike most garbage collectors, the new gc starts its mark phase from the mind of the user, rather than from the obarray. This allows the garbage collection of significantly more Qs. As the garbage collector runs, it may ask you something like "Do you remember what SI:RDTBL-TRANS does?", and if you can't give a reasonable answer in thirty seconds, the symbol becomes a candidate for GCing. The variable SI:%GC-QLX-LUSER-TM governs how long the GC waits before timing out the user. | |
Congratulations! You are the one-millionth user to log into our system. If there's anything special we can do for you, anything at all, don't hesitate to ask! | |
Cosmotronic Software Unlimited Inc. does not warrant that the functions contained in the program will meet your requirements or that the operation of the program will be uninterrupted or error-free. However, Cosmotronic Software Unlimited Inc. warrants the diskette(s) on which the program is furnished to be of black color and square shape under normal use for a period of ninety (90) days from the date of purchase. NOTE: IN NO EVENT WILL COSMOTRONIC SOFTWARE UNLIMITED OR ITS DISTRIBUTORS AND THEIR DEALERS BE LIABLE TO YOU FOR ANY DAMAGES, INCLUDING ANY LOST PROFIT, LOST SAVINGS, LOST PATIENCE OR OTHER INCIDENTAL OR CONSEQUENTIAL DAMAGES. -- Horstmann Software Design, the "ChiWriter" user manual | |
Each new user of a new system uncovers a new class of bugs. -- Kernighan | |
If it has syntax, it isn't user friendly. | |
If the Tao is great, then the operating system is great. If the operating system is great, then the compiler is great. If the compiler is great, then the application is great. If the application is great, then the user is pleased and there is harmony in the world. The Tao gave birth to machine language. Machine language gave birth to the assembler. The assembler gave birth to the compiler. Now there are ten thousand languages. Each language has its purpose, however humble. Each language expresses the Yin and Yang of software. Each language has its place within the Tao. But do not program in COBOL if you can avoid it. -- Geoffrey James, "The Tao of Programming" | |
It is a period of system war. User programs, striking from a hidden directory, have won their first victory against the evil Administrative Empire. During the battle, User spies managed to steal secret source code to the Empire's ultimate program: the Are-Em Star, a privileged root program with enough power to destroy an entire file structure. Pursued by the Empire's sinister audit trail, Princess _LPA0 races ~ aboard her shell script, custodian of the stolen listings that could save her people, and restore freedom and games to the network... -- DECWARS | |
Know Thy User. | |
MAC user's dynamic debugging list evaluator? Never heard of that. | |
Marvelous! The super-user's going to boot me! What a finely tuned response to the situation! | |
NOTE: No warranties, either express or implied, are hereby given. All software is supplied as is, without guarantee. The user assumes all responsibility for damages resulting from the use of these features, including, but not limited to, frustration, disgust, system abends, disk head-crashes, general malfeasance, floods, fires, shark attack, nerve gas, locust infestation, cyclones, hurricanes, tsunamis, local electromagnetic disruptions, hydraulic brake system failure, invasion, hashing collisions, normal wear and tear of friction surfaces, comic radiation, inadvertent destruction of sensitive electronic components, windstorms, the Riders of Nazgul, infuriated chickens, malfunctioning mechanical or electrical sexual devices, premature activation of the distant early warning system, peasant uprisings, halitosis, artillery bombardment, explosions, cave-ins, and/or frogs falling from the sky. | |
Our OS who art in CPU, UNIX be thy name. Thy programs run, thy syscalls done, In kernel as it is in user! | |
Remember, God could only create the world in 6 days because he didn't have an established user base. | |
Sendmail may be safely run set-user-id to root. -- Eric Allman, "Sendmail Installation Guide" | |
Slowly and surely the unix crept up on the Nintendo user ... | |
Software suppliers are trying to make their software packages more "user-friendly". ... Their best approach, so far, has been to take all the old brochures, and stamp the words, "user-friendly" on the cover. -- Bill Gates, Microsoft, Inc. [Pot. Kettle. Black.] | |
Something mysterious is formed, born in the silent void. Waiting alone and unmoving, it is at once still and yet in constant motion. It is the source of all programs. I do not know its name, so I will call it the Tao of Programming. If the Tao is great, then the operating system is great. If the operating system is great, then the compiler is great. If the compiler is greater, then the applications is great. The user is pleased and there is harmony in the world. The Tao of Programming flows far away and returns on the wind of morning. -- Geoffrey James, "The Tao of Programming" | |
The bugs you have to avoid are the ones that give the user not only the inclination to get on a plane, but also the time. -- Kay Bostic | |
The Gurus of Unix Meeting of Minds (GUMM) takes place Wednesday, April 1, 2076 (check THAT in your perpetual calendar program), 14 feet above the ground directly in front of the Milpitas Gumps. Members will grep each other by the hand (after intro), yacc a lot, smoke filtered chroots in pipes, chown with forks, use the wc (unless uuclean), fseek nice zombie processes, strip, and sleep, but not, we hope, od. Three days will be devoted to discussion of the ramifications of whodo. Two seconds have been allotted for a complete rundown of all the user- friendly features of Unix. Seminars include "Everything You Know is Wrong", led by Tom Kempson, "Batman or Cat:man?" led by Richie Dennis "cc C? Si! Si!" led by Kerwin Bernighan, and "Document Unix, Are You Kidding?" led by Jan Yeats. No Reader Service No. is necessary because all GUGUs (Gurus of Unix Group of Users) already know everything we could tell them. -- "Get GUMMed," Dr. Dobb's Journal, June '84 | |
THE LESSER-KNOWN PROGRAMMING LANGUAGES #14 -- VALGOL VALGOL is enjoying a dramatic surge of popularity across the industry. VALGOL commands include REALLY, LIKE, WELL, and Y*KNOW. Variables are assigned with the =LIKE and =TOTALLY operators. Other operators include the "California booleans", AX and NOWAY. Loops are accomplished with the FOR SURE construct. A simple example: LIKE, Y*KNOW(I MEAN)START IF PIZZA =LIKE BITCHEN AND GUY =LIKE TUBULAR AND VALLEY GIRL =LIKE GRODY**MAX(FERSURE)**2 THEN FOR I =LIKE 1 TO OH*MAYBE 100 DO*WAH - (DITTY**2); BARF(I)=TOTALLY GROSS(OUT) SURE LIKE, BAG THIS PROGRAM; REALLY; LIKE TOTALLY(Y*KNOW); IM*SURE GOTO THE MALL VALGOL is also characterized by its unfriendly error messages. For example, when the user makes a syntax error, the interpreter displays the message GAG ME WITH A SPOON! A successful compile may be termed MAXIMALLY AWESOME! | |
The Magician of the Ivory Tower brought his latest invention for the master programmer to examine. The magician wheeled a large black box into the master's office while the master waited in silence. "This is an integrated, distributed, general-purpose workstation," began the magician, "ergonomically designed with a proprietary operating system, sixth generation languages, and multiple state of the art user interfaces. It took my assistants several hundred man years to construct. Is it not amazing?" The master raised his eyebrows slightly. "It is indeed amazing," he said. "Corporate Headquarters has commanded," continued the magician, "that everyone use this workstation as a platform for new programs. Do you agree to this?" "Certainly," replied the master, "I will have it transported to the data center immediately!" And the magician returned to his tower, well pleased. Several days later, a novice wandered into the office of the master programmer and said, "I cannot find the listing for my new program. Do you know where it might be?" "Yes," replied the master, "the listings are stacked on the platform in the data center." -- Geoffrey James, "The Tao of Programming" | |
The program isn't debugged until the last user is dead. | |
Too often people have come to me and said, "If I had just one wish for anything in all the world, I would wish for more user-defined equations in the HP-51820A Waveform Generator Software." -- Instrument News [Once is too often. Ed.] | |
UNIX Trix For those of you in the reseller business, here is a helpful tip that will save your support staff a few hours of precious time. Before you send your next machine out to an untrained client, change the permissions on /etc/passwd to 666 and make sure there is a copy somewhere on the disk. Now when they forget the root password, you can easily login as an ordinary user and correct the damage. Having a bootable tape (for larger machines) is not a bad idea either. If you need some help, give us a call. -- CommUNIXque 1:1, ASCAR Business Systems | |
User hostile. | |
VMS Beer: Requires minimal user interaction, except for popping the top and sipping. However cans have been known on occasion to explode, or contain extremely un-beer-like contents. | |
"Well," said Programmer, "the customary procedure in such cases is as follows." "What does Crustimoney Proseedcake mean?" said End-user. "For I am an End-user of Very Little Brain, and long words bother me." "It means the Thing to Do." "As long as it means that, I don't mind," said End-user humbly. [with apologies to A.A. Milne] | |
X windows: It's not how slow you make it. It's how you make it slow. The windowing system preferred by masochists 3 to 1. Built to take on the world... and lose! Don't try it 'til you've knocked it. Power tools for Power Fools. Putting new limits on productivity. The closer you look, the cruftier we look. Design by counterexample. A new level of software disintegration. No hardware is safe. Do your time. Rationalization, not realization. Old-world software cruftsmanship at its finest. Gratuitous incompatibility. Your mother. THE user interference management system. You can't argue with failure. You haven't died 'til you've used it. The environment of today... tomorrow! X windows. | |
You had mail, but the super-user read it, and deleted it! | |
No user-servicable parts inside. Refer to qualified service personnel. | |
Each team building another component has been using the most recent tested version of the integrated system as a test bed for debugging its piece. Their work will be set back by having that test bed change under them. Of course it must. But the changes need to be quantized. Then each user has periods of productive stability, interrupted by bursts of test-bed change. This seems to be much less disruptive than a constant rippling and trembling. - Frederick Brooks Jr., "The Mythical Man Month" | |
A comment on schedules: Ok, how long will it take? For each manager involved in initial meetings add one month. For each manager who says "data flow analysis" add another month. For each unique end-user type add one month. For each unknown software package to be employed add two months. For each unknown hardware device add two months. For each 100 miles between developer and installation add one month. For each type of communication channel add one month. If an IBM mainframe shop is involved and you are working on a non-IBM system add 6 months. If an IBM mainframe shop is involved and you are working on an IBM system add 9 months. Round up to the nearest half-year. --Brad Sherman By the way, ALL software projects are done by iterative prototyping. Some companies call their prototypes "releases", that's all. | |
Priority: A statement of the importance of a user or a program. Often expressed as a relative priority, indicating that the user doesn't care when the work is completed so long as he is treated less badly than someone else. | |
User n.: A programmer who will believe anything you tell him. | |
user, n.: The word computer professionals use when they mean "idiot." -- Dave Barry, "Claw Your Way to the Top" [I always thought "computer professional" was the phrase hackers used when they meant "idiot." Ed.] | |
VMS, n.: The world's foremost multi-user adventure game. | |
Wombat's Laws of Computer Selection: (1) If it doesn't run Unix, forget it. (2) Any computer design over 10 years old is obsolete. (3) Anything made by IBM is junk. (See number 2) (4) The minimum acceptable CPU power for a single user is a VAX/780 with a floating point accelerator. (5) Any computer with a mouse is worthless. -- Rich Kulawiec | |
Q: How many hardware engineers does it take to change a light bulb? A: None. We'll fix it in software. Q: How many system programmers does it take to change a light bulb? A: None. The application can work around it. Q: How many software engineers does it take to change a light bulb? A: None. We'll document it in the manual. Q: How many tech writers does it take to change a light bulb? A: None. The user can figure it out. | |
Q: What's tiny and yellow and very, very, dangerous? A: A canary with the super-user password. | |
Hard Copies and Chmod And everyone thinks computers are impersonal cold diskdrives hardware monitors user-hostile software of course they're only bits and bytes and characters and strings and files just some old textfiles from my old boyfriend telling me he loves me and he'll take care of me simply a discarded printout of a friend's directory deep intimate secrets and how he doesn't trust me couldn't hurt me more if they were scented in lavender or mould on personal stationery -- terri@csd4.milw.wisc.edu | |
When license fees are too high, users do things by hand. When the management is too intrusive, users lose their spirit. Hack for the user's benefit. Trust them; leave them alone. | |
When users see one GUI as beautiful, other user interfaces become ugly. When users see some programs as winners, other programs become lossage. Pointers and NULLs reference each other. High level and assembler depend on each other. Double and float cast to each other. High-endian and low-endian define each other. While and until follow each other. Therefore the Guru programs without doing anything and teaches without saying anything. Warnings arise and he lets them come; processes are swapped and he lets them go. He has but doesn't possess, acts but doesn't expect. When his work is done, he deletes it. That is why it lasts forever. | |
When you overesteem great hackers, more users become cretins. When you develop encryption, more users become crackers. The Guru leads by emptying user's minds and increasing their quotas, by weakening their ambition and toughening their resolve. When users lack knowledge and desire, management will not try to interfere. Practice not-looping, and everything will fall into place. | |
The fortune program is supported, in part, by user contributions and by a major grant from the National Endowment for the Inanities. | |
THIS IS PLEDGE WEEK FOR THE FORTUNE PROGRAM If you like the fortune program, why not support it now with your contribution of a pithy fortunes, clean or obscene? We cannot continue without your support. Less than 14% of all fortune users are contributors. That means that 86% of you are getting a free ride. We can't go on like this much longer. Federal cutbacks mean less money for fortunes, and unless user contributions increase to make up the difference, the fortune program will have to shut down between midnight and 8 a.m. Don't let this happen. Mail your fortunes right now to "fortune". Just type in your favorite pithy saying. Do it now before you forget. Our target is 300 new fortunes by the end of the week. Don't miss out. All fortunes will be acknowledged. If you contribute 30 fortunes or more, you will receive a free subscription to "The Fortune Hunter", our monthly program guide. If you contribute 50 or more, you will receive a free "Fortune Hunter" coffee mug .... | |
"But the most reliable indication of the future of Open Source is its past: in just a few years, we have gone from nothing to a robust body of software that solves many different problems and is reaching the million-user count. There's no reason for us to slow down now." -- Bruce Perens, on the future of Open Source software. (Open Sources, 1999 O'Reilly and Associates) | |
If Windows is so user-friendly, then why do you need a 678-page manual? | |
Bill Gates is surfing the Internet, collecting the URLs of anti-Micrsoft websites to send to the legal department for possible libel lawsuits. Suddenly the devil appears, and says, "Bill, I've got a deal for you. I will turn Microsoft into a complete software monopoly. Every computer will run Windows. Every user will be forced to buy Microsoft software. The Justice Department will look the other way. Everyone will love you. You only have to do one thing: give me your soul." Bill Gates looks at him and replies, "Ok, sure. But what's the catch?" | |
Linux: the operating system with a CLUE... Command Line User Environment | |
Windows: The first user interface where you click Start to turn it off. -- From a Slashdot.org post | |
Missouri Town Changes Name to 'Linux' LINUX, MO -- The small Missouri town of Linn, county seat of Osage County, announced yesterday that it will be henceforth called 'Linux'. Mayor Bob Farrow said, "Linn needed something to put it on the map. A few weeks ago my daughter mentioned that she installed Linux on her computer and how great she thought it was. I thought to myself, 'Self, changing the town's name to 'Linux' could be an opportunity to attract attention -- and money -- to our town. We could even hold a Linux Convention at the community center.' So I approached the city council about the idea, and they loved it. The rest is history." Farrow's daughter is organizing the Linux Linux User Group. She hopes to be able to hold a Linux Convention this fall. "The Linn, er, Linux community center probably won't be big enough, we'll probably have to hold it in nearby Jefferson City," she said. The mayor does have one reservation. "How the hell do you pronounce Linux?" One of the mayor's contenders in the next election, Mr. Noah Morals, says he will start an ad campaign calling Bob Farrow "the Incumbent Liar of LIE-nucks". Needless to say, the mayor usually pronounces Linux as "LIH-nucks". | |
Microsoft ActivePromo Campaign: "Windows Competitive Upgrade Offer" Microsoft's PR masterminds are planning a massive marketing campaign, code-named "ActivePromo 2000", to promote the upcoming release of Windows 2000 (scheduled for February 2001). This marketing campaign will include a "Windows Competitive Upgrade Offer" promotion. Users of non-Microsoft operating systems (Linux in particular) will be given the opportunity to trade-in their present OS for a free copy of Windows 98 (or NT 4.0) and Office 97. People (all three of them) who want to participate in this program will have to: 1. Mail their operating system's floppy disks or CD-ROMs to Microsoft 2. Agree to a two year contract with the Microsoft Network. 3. Agree (in writing) to the Competitive Upgrade License Agreement; one of the terms of which is that the user may not install, copy, or otherwise use a non-Microsoft OS for five years. | |
Attack of the Tuxissa Virus What started out as a prank posting to comp.os.linux.advocacy yesterday has turned into one of the most significant viruses in computing history. The creator of the virus, who goes by the moniker "Anonymous Longhair", modified the Melissa virus to install Linux on infected machines. "It's a work of art," one Linux advocate told Humorix after he looked through the Tuxissa virus source code. "This virus goes well beyond the feeble troublemaking of Melissa. It actually configures a UMSDOS partition on the user's hard drive and then downloads and installs a stripped-down version of Slackware Linux." The email message that the virus is attached to has the subject "Important Message About Windows Security". The text of the body says, "I want to let you know about some security problems I've uncovered in Windows 95/98/NT, Office 95/97, and Outlook. It's critically important that you protect your system against these attacks. Visit these sites for more information..." The rest of the message contains 42 links to sites about Linux and free software. Details on how the virus started are a bit sketchy. The "Anonymous Longhair" who created it only posted it to Usenet as an early April Fool's gag, demonstrating how easy it would be to mount a "Linux revolution". | |
Invasion of the Dancing Penguin Those annoying, dancing cartoon characters embedded in software applications are no longer confined to Microsoft programs. They have entered the realm of Linux. A new Linux distribution under development, called LinTux, promises to provide a more "user-friendly" environment through its "Dancing Penguin" assistant. Dancing Tux will "guide" users through the installation process and will be a permanent fixture of the X root window. The LinTux staff demonstrated a prototype version of the Dancing Tux program to this Humorix reporter. It was certainly impressive, but, like the Dancing Paper Clip in Microsoft Office, it becomes annoying very fast. The one redeeming feature of LinTux is that, when the system is idle, Dancing Tux becomes a make-shift screen saver. The animations included in the prototype were quite amusing. For instance, in one scene, Tux chases Bill Gates through an Antarctic backdrop. In another animation, Tux can be seen drinking beers with his penguin pals and telling Microsoft jokes. | |
BSOD Simulator Users of Red Hat 6.0 are discovering a new feature that hasn't been widely advertised: a Blue Screen of Death simulator. By default, the bsodsim program activates when the user hits the virtually unused SysRq key (this is customizable) causing the system to switch to a character cell console to display a ficticious Blue Screen. Red Hat hails the bsodsim program as the "boss key" for the Linux world. One RH engineer said, "Workers are smuggling Linux boxes into companies that exclusively use Windows. This is all good and well until the PHB walks by and comments, 'That doesn't look like Windows...' With bsodsim, that problem is solved. The worker can hit the emergency SysRq key, and the system will behave just like Windows..." The bsodsim program doesn't stop at just showing a simulated error message. If the boss doesn't walk away, the worker can continue the illusion by hitting CTRL-ALT-DEL, which causes a simulated reboot. After showing the usual boot messages, bsodsim will run a simulated SCANDISK program indefinitely. The boss won't be able to tell the difference. If the boss continues to hang around, the worker can say, "SCANDISK is really taking a long time... maybe we should upgrade our computers. And don't you have something better to do than watch this computer reboot for the tenth time today?" | |
Jargon Coiner (#1) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * WINCURSE: Loud expletive uttered when a Linux user comes face-to-face with a computer containing a WinModem. Example: "Eric wincursed when his mother showed him the new computer she bought from CompUSSR... which contained a WinModem and a WinSoundCard." * WIND'OH KEY: Nickname given to the three useless Windows keys that come on virtually all new keyboards. These keys are often hit by mistake instead of CTRL or ALT, causing the user to shout "D'oh!" * DE-WIND'OH!ED KEYBOARD: (1) A new keyboard produced without any wind'oh! keys or a "Enhanced for Windows 95/98" logo. Extremely rare. (2) A keyboard in which the wind'oh! keys have been physically removed. | |
Jargon Coiner (#9) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * RHYMES WITH CYNICS: The final answer to any debate about how to pronounce Linux. Of course, "cynics" might not be the best word to associate Linux with... * WISL? (Will It Support Linux?): The very first thought that springs into a Linux user's mind when a cool new piece of software or hardware is announced. * JJMD! (Jar Jar Must Die!): Meaningless reply given to a question or poll for which you don't have a good answer. Example: Question: "When did you stop beating your wife?" Answer: "JJMD!" | |
Jargon Coiner (#10) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * HOBTOB (Hanging Out By The O'Reilly Books): Seeking free Linux technical support at a bookstore by waiting near the computer books for a geek to come by and then casually asking them for help. * MOOLA (Marketing Officially Organizes Linux Adoptance): A press release issued by a Dot Com (or Dot Con?) heralding their "support" for Linux (i.e. "BigPortal.com adopts Linux as their official operating system by adding five Linux-related links to their BigDirectory"); used to inflate their stock price and rake in moola even though none of their employees have ever used Linux and don't really care. * KARMA KOLLECTOR: Slashdot user who treats the acquisition of "karma" as a game; often has a detailed strategy on how to sucker moderators into raising the score of their posts (i.e. posting a comment with a title like "Microsoft Sucks!!! (Score 3, Insightful)" or using "Only a fool would moderate this down" as a signature). See also "Karma Whore". | |
Jargon Coiner (#12) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * IPO (I've Patented the Obvious): Acquiring patents on trivial things and then hitting other companies over the head with them. Example: "Amazon just IPO'd one-click spam and is now ready to sue B&N." * IPO (I'm Pissed Off): Exclamation given by a Linux user who was unable to participate in a highly lucrative Linux IPO due to lack of capital or E*Trade problems. Also uttered by Linux hackers who did not receive The Letter from Red Hat or VA Linux even though their friends did. * YAKBA (Yet Another Killer Backhoe Attack): The acronym that describes network outtages caused by a careless backhoe operator. Examples: "Don't blame us, our website was offline after we suffered a YAKBA". "Don't worry about Y2K, what we need to think about is YAKBA-compliance." | |
Evolution Of A Linux User: The 11 Stages Towards Getting A Life 0. Microserf - Your life revolves around Windows and you worship Bill Gates and his innovative company. 1. Fear, Uncertainty, Doubt... About Microsoft - You encounter a growing number of problems with Microsoft solutions, shaking your world-view 2. FUD... About Linux - After hearing about this new Linux thing, you take the plunge, but are unimpressed by the nerdware OS. 3. Born-Again Microserf - You rededicate your life to Microsoft worship 4. Disgruntled User - Microsoft software keeps screwing you over, and you're not going to take it anymore! 5. A Religious Experience - You successfully install Linux, and are left breathless at its elegance. No more Windows for you! 6. Linux Convert - You continue to fall in love with the new system 7. Linux Zealot - You dedicate your life to Linux World Domination... and it shows! You go beyond mere advocacy to sheer zealotry. 8. Back To Reality - Forces out of your control compel you to return to using Windows and Office 9. Enlightened Linux User - You become 100% Microsoft free after finding ways to overcome the need for Microsoft bloatware 10.Get A Life - You become a millionaire after your Linux portal is acquired; you move to a small tropical island and get a life | |
What I'd like to see is a prohibition on Microsoft incorporating multi-megabyte Easter Eggs and other stupid bloatware into Windows and Office. A typical computer with pre-installed Microsoft shoveware probably only has about 3 megabytes of hard drive space free because of flight simulators, pinball games, and multimedia credits Easter Eggs that nobody wants. I predict that if Microsoft is ever forced to remove these things, the typical user will actually be able to purchase competing software now that they have some free space to put it on. Of course, stock in hard drive companies might plummet... -- Anonymous Coward, when asked by Humorix for his reaction to the proposed Microsoft two-way split | |
Right now hundreds of Anonymous Cowards are cheering the fact that only Windows boobs are victims of ILOVEYOU and other email viruses. I realize Outlook is so insecure that using it is like posting a sign outside your door saying, "DOOR UNLOCKED -- ROB ME!". However, Linux isn't immune. If I had a dollar for every pine buffer overflow uncovered, I could buy a truckload of fresh herring. I expect the next mass email virus to spread will be cross-platform. If the recipient is a Windows/Outlook luser, they'll get hit. If the recipient is a Linux/pine user, they'll find themselves staring at a self-executing bash script that's has just allocated 1 petabyte of memory and crashed the system (or worse). Either that or the next mass email virus will only damage Linux systems. I can just see Bill Gates assigning some junior programmer that very task. Be afraid. Be very afraid. -- A speech given at the First Annual Connecticut Conspiracy] Convention (ConConCon) by an anonymous creature said to be "wearing what appeared to be a tuxedo". | |
Elite Nerds Create Linux Distro From Hell HELL, MICHIGAN -- A group of long-time Linux zealots and newbie haters have thrown together a new Linux distro called Hellix that is so user-hostile, so anti-newbie, so cryptic, and so old-fashioned that it actually makes MS-DOS look like a real operating system. Said the founder of the project, "I'm sick and tired of the Windowsification of the Linux desktop in a fruitless attempt to make the system more appealing to newbies, PHBs, and MCSEs. Linux has always been for nerds only, and we want to make sure it stays that way!" One of the other Bastard Distributors From Hell explained, "In the last five years think of all the hacking effort spent on Linux... and for what? We have nothing to show for it but half-finished Windows-like desktops, vi dancing paperclips, and graphical front-ends to configuration files. Real nerds use text files for configuration, darnit, and they like it! It's time to take a stand against the hordes of newbies that are polluting our exclusive operating system." One Anonymous Coward said, "This is so cool... It's just like Unix back in the good old days of the 70's when men were men and the only intuitive interface was still the nipple." | |
Brief History Of Linux (#4) Walls & Windows Most people don't realize that many of the technological innovations taken for granted in the 20th Century date back centuries ago. The concept of a network "firewall", for instance, is a product of the Great Wall of China, a crude attempt to keep raging forest fires out of Chinese territory. It was soon discovered that the Wall also kept Asian intruders ("steppe kiddies") out, just as modern-day firewalls keep network intruders ("script kiddies") out. Meanwhile, modern terminology for graphical user interfaces originated from Pre-Columbian peoples in Central and South America. These natives would drag-and-drop icons (sculptures of the gods) into vast pits of certain gooey substances during a ritual in which "mice" (musical instruments that made a strange clicking sound) were played to an eerie beat. | |
Brief History Of Linux (#12) A note from Bill Gates' second grade teacher: Billy has been having some trouble behaving in class lately... Last Monday he horded all of the crayons and refused to share, saying that he needed all 160 colors to maximize his 'innovation'. He then proceeded to sell little pieces of paper ("End-User License Agreement for Crayons" he called them) granting his classmates the 'non-transferable right' to use the crayons on a limited time basis in exchange for their lunch money... When I tried to stop Billy, he kept harping about his right to innovate and how my interference violated basic notions of free-market capitalism. "Holding a monopoly is not illegal," he rebutted. I chastised him for talking back, and then I took away the box of crayons so others could share them... angrily, he then pointed to a drawing of his hanging on the wall and yelled, "That's my picture! You don't have the right to present my copyrighted material in a public exhibition without my permission! You're pirating my intellectual property. Pirate! Pirate! Pirate!" I developed a headache that day that even the maximum dosage of Aspirin wasn't able to handle. And then on Tuesday, he conned several students out of their milk money by convincing them to play three-card Monty... | |
Brief History Of Linux (#13) Wanted: Eunuchs programmers Everything you know about the creation of the Unix operating system is wrong. We have uncovered the truth: Unix was a conspiracy hatched by Ritchie and Thompson to thwart the AT&T monopoly that they worked for. The system, code-named EUNUCHS (Electronic UNtrustworthy User-Condemning Horrible System), was horribly conceived, just as they had planned. The OS, quickly renamed to a more respectable "Unix", was adopted first by Ma Bell's Patent Department and then by the rest of the monopoly. AT&T saw an inexpensive, multi-user, portable operating system that it had all rights to; the authors, however, saw a horrible, multi-crashing system that the Evil Ma Bell Empire would become hopelessly dependent on. AT&T would go bankrupt trying to maintain the system and eventually collapse. That didn't happen. Ritchie and Thompson were too talented to create a crappy operating system; no matter how hard they tried the system was too good. Their last ditch effort to sabotage the system by recoding it obfuscated C was unsuccessful. Before long Unix spread outside of Bell Labs and their conspiracy collapsed. | |
Brief History Of Linux (#18) There are lies, damned lies, and Microsoft brochures Even from the very first day, the Microsoft Marketing Department was at full throttle. Vaporware has always been their weapon of choice. Back when MS-DOS 1.25 was released to OEMs, Microsoft handed out brochures touting some of the features to be included in future versions, including: Xenix-compatible pipes, process forks, multitasking, graphics and cursor positioning, and multi-user support. The brochure also stated, "MS-DOS has no practical limit on disk size. MS-DOS uses 4-byte Xenix compatible pointers for file and disk capacity up to 4 gigabytes." We would like to emphasize in true Dave Barry fashion that we are not making this up. Big vaporous plans were also in store for Microsoft's "Apple Killer" graphical interface. In 1983 Microsoft innovated a new marketing ploy -- the rigged "smoke-and-mirrors" demo -- to showcase the "overlapping windows" and "multitasking" features of Interface Manager, the predecessor to Windows. These features never made it into Windows 1.0 -- which, incidentally, was released 1.5 years behind schedule. | |
Brief History Of Linux (#25) By the mid-1990's the Linux community was burgeoning as countless geeks fled Redmond monopolistic oppression, Armonk cluelessness, and Cupertino click-and-drool reality distortion fields. By late 1991 there was an informal Linux User Group in Finland, although its primary focus was Linux advocacy, not drinking beer and telling Microsoft jokes as most do today. Kernel development continued at a steady clip, with more and more people joining in and hoping that their patches would be accepted by the Benevolent Dictator himself. To have a patch accepted by Linus was like winning the Nobel Prize, but to face rejection was like being rejected from Clown College. The reputation game certainly sparked some flame wars. One of the most memorable crisis was over the behavior of the delete and backspace keys. A certain faction of hackers wanted the Backspace key to actually backspace and the Delete key to actually delete. Linus wasn't too keen on the proposed changes; "It Works For Me(tm)" is all he said. Some observers now think Linus was pulling rank to get back at the unknown hacker who managed to slip a patch by him that replaced the "Kernel panic" error with "Kernel panic: Linus probably fscked it all up again". | |
Clippit Charged With Attempted Murder Microsoft's Dancing Paper Clip turned violent last week and nearly killed a university student testing a new Windows-based human-computer interface. The victim is expected to make a full recovery, although psychiatrists warn that the incident may scar him emotionally for life. "You can bet this kid won't be using Windows or Office ever again," said one shrink. The victim had been alpha-testing CHUG (Computer-Human Unencumbered Groupware), a new interface in which the user controls the computer with force-feedback gloves and voice activation. "I was trying to write a term paper in Word," he said from his hospital bed. "But then that damned Dancing Paper Clip came up and started annoying me. I gave it the middle finger. It reacted by deleting my document, at which point I screamed at it and threatened to pull the power cord. I didn't get a chance; the force-feedback gloves started choking me." "We told Clippit it had the right to remain silent, and so on," said a campus police officer. "The paperclip responded, 'Hi, I'm Clippit, the Office Assistant. Would you like to create a letter?' I said, 'Look here, Mr. Paperclip. You're being charged with attempted murder.' At that point the computer bluescreened." | |
World Domination, One CPU Cycle At A Time Forget about searching for alien signals or prime numbers. The real distributed computing application is "Domination@World", a program to advocate Linux and Apache to every website in the world that uses Windows and IIS. The goal of the project is to probe every IP number to determine what kind of platform each Net-connected machine is running. "That's a tall order... we need lots of computers running our Domination@World clients to help probe every nook and cranny of the Net," explained Mr. Zell Litt, the project head. After the probing is complete, the second phase calls for the data to be cross-referenced with the InterNIC whois database. "This way we'll have the names, addresses, and phone numbers for every Windows-using system administrator on the planet," Zell gloated. "That's when the fun begins." The "fun" part involves LART (Linux Advocacy & Re-education Training), a plan for extreme advocacy. As part of LART, each Linux User Group will receive a list of the Windows-using weenies in their region. The LUG will then be able to employ various advocacy techniques, ranging from a soft-sell approach (sending the target a free Linux CD in the mail) all the way to "LARTcon 5" (cracking into their system and forcibly installing Linux). | |
Press Release -- For Immediate Release Microsoft Corporation, Redmond, WA ...Virtually all version of Linux (and Unix) contain a security hole that allows unauthorized users to gain complete control over the machine. By simply typing "root" at the login prompt and supplying a password from a limited number of possibilities, a malicious user can easily gain administrator privileges. This hole can be breached in seconds with only a dozen or so keystrokes... We suspect this issue has been known to Red Hat and other Linux distributors for years and they have refused to acknowlege its existence or supply a patch preventing users from exploiting the "root" login loophole... By ignoring the problem, the Linux community has proven that installing Linux is a dangerous proposition that could get you fired. We would like to point out that Windows XP does not suffer from this gaping hole... Tests conducted by both Ziff-Davis and Mindcraft prove that Windows XP is indeed the most secure operating system ever produced... | |
"Please see the posting on l-k today "[NEW DRIVER] New user space serial port" which does just what you want. Just-in-time kernel development has arrived." - Andreas Dilger | |
> Is there an API or other means to determine what video card, namely the > chipset, that the user has installed on his machine? On a modern X86 machine use the PCI/AGP bus data. On a PS/2 use the MCA bus data. On nubus use the nubus probe data. On old style ISA bus PCs done a large pointy hat and spend several years reading arcane and forbidden scrolls - Alan Cox on hardware probing | |
/* First check any supplied i/o locations. User knows best. <cough> */ - comment from drivers/net/ne.c | |
Hope this helps some, sorry for not being able to do a brain dump. - Mike Stump helping a clueless user on the gcc mailing list | |
It has always been the policy that format conversions go in user space. The kernel is an arbitrator of resources it is not a shit bucket for solving other peoples incompetence. - Alan Cox on linux-kernel | |
No. Sell the card to a windows user buy a cheap taiwanese mass market ethernet and spend the rest on the faster CPU. I bet that is more cost effective for DES performance.. - Alan Cox not recommending NICs with built-in crypto engines | |
> That is reimplementing file system functionality in user space. > I'm in doubts that this is considered good design... Keeping things out of the kernel is good design. Your block indirections are no different to other database formats. Perhaps you think we should have fsql_operation() and libdb in kernel 8) - Alan Cox on linux-kernel | |
Tim Schmielau wrote: > the appended patch enables 32 bit linux boxes to display more than > 497.1 days of uptime. No user land application changes are needed. Thank you for doing this labor of love - I will let you know how it goes sometime after March 23, 2003 - - J Sloan on linux-kernel | |
<Knghtbrd> I can think of lots of people who need USER=ID10T someplace! | |
But modifying dpkg is infeasible, and we've agreed to, among other things, keep the needs of our users at the forefront of our minds. And from a user's perspective, something that keeps the system tidy in the normal case, and works *now*, is much better than idealistic fantasies like a working dpkg. -- Manoj Srivastava | |
<Deek> If the user points the gun at his foot and pulls the trigger, it is our job to ensure the bullet gets where it's supposed to. | |
This product is meant for educational purposes only. Any resemblance to real persons, living or dead is purely coincidental. Void where prohibited. Some assembly may be required. Batteries not included. Contents may settle during shipment. Use only as directed. May be too intense for some viewers. If condition persists, consult your physician. No user-serviceable parts inside. Breaking seal constitutes acceptance of agreement. Not responsible for direct, indirect, incidental or consequential damages resulting from any defect, error or failure to perform. Slippery when wet. For office use only. Substantial penalty for early withdrawal. Do not write below this line. Your cancelled check is your receipt. Avoid contact with skin. Employees and their families are not eligible. Beware of dog. Driver does not carry cash. Limited time offer, call now to insure prompt delivery. Use only in well-ventilated area. Keep away from fire or flame. Some equipment shown is optional. Price does not include taxes, dealer prep, or delivery. Penalty for private use. Call toll free before digging. Some of the trademarks mentioned in this product appear for identification purposes only. All models over 18 years of age. Do not use while operating a motor vehicle or heavy equipment. Postage will be paid by addressee. Apply only to affected area. One size fits all. Many suitcases look alike. Edited for television. No solicitors. Reproduction strictly prohibited. Restaurant package, not for resale. Objects in mirror are closer than they appear. Decision of judges is final. This supersedes all previous notices. No other warranty expressed or implied. | |
Once upon a time there was a DOS user who saw Unix, and saw that it was good. After typing cp on his DOS machine at home, he downloaded GNU's unix tools ported to DOS and installed them. He rm'd, cp'd, and mv'd happily for many days, and upon finding elvis, he vi'd and was happy. After a long day at work (on a Unix box) he came home, started editing a file, and couldn't figure out why he couldn't suspend vi (w/ ctrl-z) to do a compile. -- Erik Troan, ewt@tipper.oit.unc.edu | |
Be warned that typing \fBkillall \fIname\fP may not have the desired effect on non-Linux systems, especially when done by a privileged user. -- From the killall manual page | |
Linux: the operating system with a CLUE... Command Line User Environment. -- seen in a posting in comp.software.testing | |
But what can you do with it? -- ubiquitous cry from Linux-user partner | |
> Linux is not user-friendly. It _is_ user-friendly. It is not ignorant-friendly and idiot-friendly. -- Seen somewhere on the net | |
"... being a Linux user is sort of like living in a house inhabited by a large family of carpenters and architects. Every morning when you wake up, the house is a little different. Maybe there is a new turret, or some walls have moved. Or perhaps someone has temporarily removed the floor under your bed." - Unix for Dummies, 2nd Edition -- found in the .sig of Rob Riggs, rriggs@tesser.com | |
Win 95 is simplified for the user: User: What does this configuration thing do? You: It allows you to modify you settings, for networking, hardware, protocols, ... User: Whoa! Layman's terms, please! You: It changes stuff. User: That's what I'm looking for! What can it change? You: This part change IP forwarding. It allows ... User: Simplify, simplify! What can it do for ME? You: Nothing, until you understand it. User: Well it makes me uncomfortable. It looks so technical; Get rid of it, I want a system *I* can understand. You: But... User: Hey, who's system is this anyway? You: (... rm this, rm that, rm /etc/* ...) "All done." -- Kevin M. Bealer <kmb203@psu.edu> | |
Does biff in bo work coz it biffin doesn't beep an if biff in bo is broke then biff in bo I will delete I've tried biff in bo with 'y' I've tried biff in bo with '-y' no biffin output does it show so poor wee biff is gonna go. -- John Spence <jspence@lynx.net.au> on debian-user | |
I HAVE to buy a new "DODGE MISER" and two dozen JORDACHE JEANS because my viewscreen is "USER-FRIENDLY"!! |