The difference is that MacOS is designed for idiots and Windows95 by idiots. - Johnathon Weare 8/5/96 (I had a Mac habit that I've kicked) Yeh, I just don't know Windows95 enough - A computer programmer with a degee in computer science trying to copy a directory. 2/7/96 So, if anybody wants to have hardware sent to them: don't call me, but instead write your own unix operating system. It has worked every time for me. - Linus Torvalds, author of Linux (Unix-like) OS WARNING: Process [netscape3] 10615 generated trap, but has signal 10 held or ignored Process has been killed to prevent infinite loop -Johnathon Weare's console output 4/7/96 Real scientists use yesterdays computers to solve tomorrows problems. Computer scientists use tomorrows computers to solve yesterdays problems. -? Scientists stand on each others shoulders. Computer scientists stand on each others feet. -? Mutually suspicious sets of users should use different administrators. -unix man page Where a computer like the ENIAC is equipped with 18,000 vacuum tubes and weighs 30 tons, computers in the future may have only 1,000 vacuum tubes and weigh only1 1/2 tons. -Popular Mechanics, March 1949 In the future, Britain will need 3 or possibly 4 computers. -report on Britain's computing needs in 1950s (inexact quote) I think there is a world market for maybe five computers. -Thomas Watson, chairman of IBM, 1943 I do not know what the language of the year 2000 will look like, but it will be called FORTRAN. -Attributed to many people including Seymour Cray, John Backus You can measure a programmer's perspective by noting his attitude on the continuing vitality of FORTRAN. -Alan Perlis (Epigrams) The computer is a lot closer. -world chess champion Gary Kasparov on the odds of a woman earning his title [DOS] sucks dead bunnies through a bent straw. -Paul Close, Silicon Graphics People who live in windowed environments shouldn't cast pointers. IRIX was never designed to be a truly secure system, ... -SGI insight manual chapter How Secure Is IRIX? If you want to view or edit another user's file, and you do not have permission to do so, you can change the permissions if: The system has a root password and you know either the root password or the password for the user's account. The system does not have a root password. -SGI insight manual chapter Giving Yourself Permission to View and Edit Another User's File To find out if your system has a root password, type or select and paste: su If a # sign appears on the next line in the shell window, your machine does not have a root password and you may continue with the installation. If you are prompted for a password and you don't know what it is, contact your system administrator. - SGI web page The future is seldom the same as the past - Seymour Cray 4/6/95 > Is there a means to block unauthorized web servers from operating on a > corporate Intranet? -macd@panix.com (Michael MacDonald) You say this is a Corporate Intranet. This means you are part of a chain of absolute management control over the Intranet. This is where Policy should come before Technology. You ban unauthorized web servers by Policy, then detect them with the usual tools, and then apply the Policy to the persons involved. -Randy.Witlicki@hanover.valley.net (Randy Witlicki) Some people hack for fun, some because they want things their way, some don't because they can't, and some because they can't be bothered. Some can make anything work, some can but would rather not, and some could misconfigure a bowling ball.-bill davidsen? Apathy Error: Don't bother striking any key. First Law of System Requirements: "Anything is possible if you don't know what you're talking about..." Disraeli was pretty close: actually, there are Lies, Damn lies, Statistics, Benchmarks, and Delivery dates. support hardware for money, write software for free - Johnathon Weare 6/10/97 Charles Wang from Computer Associates, when describing a new product earlier this year (97): "It's fully buzzword compliant."