computer jokes jokes

Jokes » computer jokes » jokes 3

computer jokes


the hacker syndrome
 
 
by Tad Deriso

There is some compelling force in all Hackers that seems to draw them to their computers every day. Why they get up at 4am to use the modem, and why they continue to rack up a truly incredible phone bill is beyond me.

Most computer areas, at your home or at your office, tend to be messy. Even you try to keep it clean, it is truly impossible. Whether it be empty Coke cans laying all around, soldering devices, electric diodes, computer parts, or integrated circuits, it is not only a pain for your mother to look at, but a prime Russian ICBM missile target as well.

There is much detail needed to explain a Hacker. For instance, instead of organizing his clothes by color, best ones, or style, he organizes his by pile. Also, he likes to sing songs such as, "Let's get Digital", "We all live in a yellow subroutine", and "Somewhere over the RAMbow".

Most Hackers do well in school. The reason is not to impress their teachers, not to get money from their parents, and not to be educated, but they do it so they can hopefully get a scholarship to MIT. You can't blame them, though, if they are looking out into space. It might be because they are worried if MCI traced the calls that they sent to NORAD.

All Hackers, big or small, love computers, whether they be Trash-80's or an IBM 360/VM workstation. When they get on one, it's mighty hard to get them off of it.

There are 2 types of Hackers. One who likes to crash local BBS's, and the one who writes programs in Assembly Language. The Hacker who crashes systems is the one that most people think that a Hacker is. A typical example of one is John Fredrickson (A.K.A. "The Phone Man"). He loves to crash computers, and break into illegal systems. The ones that he has gotten in to are MCI, CitiBank, school systems, IBM, Southern Bell, and Georgia Tech, not to mention all the ones in between.

The second type of Hacker is the programmer. He writes games, utilities, and anything else that he can think of. Take for example, John Harris, a freelance software writer for On-Line Software Co. John had a brainstorm one day, and decided to write Frogger for the Apple. He thought that it would take about 3 weeks to complete. He started on Frogger a week late, because of the complicated music set that he had to write. After two months, he was almost done. He decided to take a break and go to the Software Expo. He decided to take his nearly completed Frogger, and show it to the consumers at the show. He also took with him the only back-up copy, in case the main disk did not boot.

While at the fair, he was talking to the Manager about getting a booth. He had his disks with him. Then, when he got a booth reserved, he reached down to get his disks, and they were gone! All his hard work, including the MultiLevel character generator, music lines, disk subroutines, assembly routines, debugging programs, etc. All gone.

After that tragedy, John was in a deep depression. He finally started working on it again in 3 months. He completed it in 4 months and 3 days.

Part Two:

Hackers always take time off. There is always one way to notice a true Hacker. At a party, the true Hacker is the one in the corner talking about operating system security and how to get around it. At the beach, the True Hacker is the one drawing flow charts in the sand. At a football game, the true Hacker is the one comparing the football plays against a simulation printed on 11 by 14 fanfold paper.

Most Hackers work for the U.S. Government-- mainly the Department of Defense. You can see the best Hackers at the Jet Propulsion Laboratory in California.

What sort of environment does a Hacker function best in? No, not a heated room with a clean table and disks organized neatly, but they do best in rooms that have line-printed Snoopy calendars from the year 1969. They do not know how to cook, so they survive on Twinkies and coffee. Instead of wasting electricity for a heater, they spend it on air-conditioners to cool of their computer system in mid-January when the temperatures are below freezing. They wear layers and layers of clothing to keep the body heat in. When you see one of these people, instead of a Hacker coming into your mind, you think that he is about to go on a Polar expedition somewhere in the North Pole.

Hackers also like to hang around arcades. (This is also true for kids, little old ladies, and fighter pilots.) There, secluded in their

own environment, Hackers can talk freely on computer hints and short cuts while playing Pac-Man, or Joust.

All Hackers like Graphics. They like low-resolution, but prefer high-resolution the best. These graphics, such as Sine waves, rotating 3-D boxes, and little balloons, are confined to the limits of a systems capability. The older more experienced Hackers are the ones who are lucky enough to get to work on a VAX system, and maybe even a CRAY-1 SuperComputer. If they use these, they have only the limits of their imagination to stop them.

Most Middle School Hackers between the ages of 10 through 14, like to use computers to do reports on, and play games. Some of these younger generation Hackers have gotten into BASIC programming.

Some people, like to impress real Hackers by making them think that they know everything. There is a name for this kind of person. He is a Sub-Hacker (Intillectuous dumbfoundeth). For instance, you come up to them one day, and say,"Hey so-and-so what does BASIC stand for?" and you could sit there for days, and he would act like the answer was on the tip of his tongue, when it was probably in his toes. It is people like this that give Hackers a bad name.

Part Three:

All Hackers have rules that they go by. One is to never call long distance on Monday, because of the high phone charge. If builders built buildings they way programmers wrote programs, the first woodpecker that comes along would destroy civilization. Another is, if the computer accepts a program on the first run without any errors, either there is a malfunction, or it must be a dream.

Hackers are a unique breed. Combining intelligence, personality, and a morale sense of good taste. A Hacker enjoys the environment that appeals to him the most. Such as, the computer room, the arcade, science lab, or the Atari downstairs. They like to be alone. Secluded in their own thoughts, thinking of what the password could be to log on to General Electric. Hackers are the people who are going to make our future brighter, and more exciting in the field of electronics, data processing, artificial intelligence, and programming. We need to support these people in all the ways that we can, so we will be insured of a more happier future in the world of technological advancements.

computer acronyms list
 
 
Humorous Computer-Related Acronyms

IBM

I Blame Microsoft

Idiots Buy Me

Idiots Building Machines

I'll Buy Macintoshes

It Bit Me

It Built Microsoft

It's Better Manually

I've Been Mislead

I've Been Mugged

WINDOWS

Well, It Never Does Operate With Speed

When I Need Data Output Without Speed

While Idle, Needs DX or WorkStation

Will Install Needless Data On Whole System

WIN

Whoppingly Immense NOP

Worm Infestation Netware

MS-WINDOWS NT / WINDOWS NT

My Solitaire With Its New De-accelerator, Only With Some Network Technology

Well Intended, Netword De-accelerator, Only Works Sometimes, Never Totally

WINDOWS (as a) Network Trojan

Different Operating Systems Expectations

Macintosh: What You See Is What You Get

MS-DOS: You Asked For It, You Got It

UNIX: IfUHv2sk, UDntWnt2Kno

VMS: You Got It, All Of It, Want It Or Not

Random Abbreviations for Many Computer Companies

APPLE: Arrogance Produces Profit-Losing Entity

DEC: Dump Everything and Close

DEC: Do Expect Cuts

HCL: Hilarious Computer Logic

HP: Hot Pursuit

IBM: I Blame Microsoft

MAC: Most Absurd Computer

MACINTOSH: Most Applications Crash; If Not, The Operating System Hangs

MICROSOFT: Most Intelligent Customers Realize Our Software Only Fools Teenagers

NEXT: Now EXchange for Trash

OS/2: Obsolete Soon, Too.

WARP: What A Rot Program

Acronymns for Other Computer Terms:

AMIGA: A Merely Insignificant Game Addiction

BASIC: Bill's Attempt to Seize Industry Control

CD-ROM: Consumer Device, Rendered Obsolete in Months

COBOL: Completely Obsolete Business Oriented Language

DOS: Defective Operating System

ISDN: It Still Does Nothing

LISP: Lots of Infuriating & Silly Parenthesis

MIPS: Meaningless Indication of Processor Speed

PCMCIA: People Can't Memorize Computer Industry Acronyms

PENTIUM: Produces Erroneous Numbers Through Incorrect Understanding of Mathematics

SCSI: System Can't See It

WWW: World Wide Wait

surfing the internet
 
 
Surfin' the Net
So I think I'm in the clear
the boss is no where in sight
I logon to the web and start to surf
and then my hair stands up with fright

the footsteps coming down the hall
are quickening in pace
there is no time to exit
no way to save my face

so I press the power button
and relax just a bit
there is no way he can tell
exactly what I hit

I act all surprised
don't know why my machine died
"simply unpredictable these
computers are!" I cried

"So we'll get you a new one
a computer that won't crash" he exclaims
Do you think he'll wonder
when the new one acts the same?

bought a bad computer
 
 
Top Ten Signs You Bought A Bad Computer

  1. Lower corner of screen has the words "Etch-a-sketch" on it.
  2. It's celebrity spokesman is that "Hey Vern!" guy.
  3. In order to start it you need some jumper cables and a friend's car.
  4. It's slogan is "Pentium: redefining mathematics".
  5. The "quick reference" manual is 120 pages long.
  6. Whenever you turn it on, all the dogs in your neighborhood start howling. The screen often displays the message, "Ain't it break time yet?" The manual contains only one sentence: "Good Luck!" The only chip inside is a Dorito. You've decided that your computer is an excellent addition to your fabulous paperweight collection.

Page 4 of 20     «« Previous | Next »»