Products
The main assumption of the computer and network security principle "security by obscurity" is that a system cannot be compromised if nobody on the ...
View full detailsWithout words.
Uh Oh...Moments where you do not want to be the database admin...
To be or not to be, that is the question.2b, or not 2b, that is the question./(bb|[^b]{2})/ We knew it: coders are poets. If only Shakespeare had b...
View full detailsFor the code monkeys among you ;-)
It is surprisingly easy to hack into other computer systems, often a simple phone call does the trick: "Hello, I am your system administrator. I ne...
View full detailsThis quote from Linus hits the nail on the head :)
Imagine that you’ve just created a model that allows different technical systems to communicate with each other and that features different layers ...
View full detailsThe (almost exclusively jokingly used) eighth layer of the OSI model for network protocols is a nice way of saying that the problem lies with the p...
View full detailsTranslated into "normal language", the T-shirt text would read something like "Please stay at home. Don't broadcast /connect with everyone". For ex...
View full detailsBasically, programming has a lot in common with Lego: on the one hand, it's worth starting at a young age (keyword: practice makes perfect), and on...
View full detailsBasically, programming has a lot in common with Lego: on the one hand, it's worth starting at a young age (keyword: practice makes perfect), and on...
View full detailsThe back says ACK.SYN/ACK are the "commands" that the TCP/IP protocol uses to establish every connection.
Got yourself a mechanical keyboard? Then you know they're well-known for their high quality and their good typing feel. A Das Keyboard, a Filco or ...
View full detailsGot yourself a mechanical keyboard? Then you know they're well-known for their high quality and their good typing feel. A Das Keyboard, a Filc...
View full detailsAs we all know, a good computer scientist knows how to achieve a certain goal with as little effort as possible. According to Bill Gates, a lazy pe...
View full detailsComments in the code are grossly overrated. Everything is already there! If you have a plan of the matter, you don't need any extra explanations ;)
When it's done, it's done and everything will run the way you expect it to run. Well, in theory...In a couple of months, you might have to make som...
View full detailsOn January 19, 2038, exactly on 03:14:07 (GMT) the 32-bit Unix time variable will be completely filled!Unix-like systems store the time as the numb...
View full detailsIf you don't get this one, you belong to the rest... ;-) If there's a slight smile on your face though, you should probably think about h...
View full detailsLook again!Even on t-shirts, the number of bugs increases by the day. All getDigital t-shirts are of course way past the beta phase ;)
"Is your computer running low on disk space? Are old holiday pictures and text documents clogging your hard drive? Then simply put everything into ...
View full detailsHome is still the best place to be. Who likes to sit at other people's computers where nothing is set up the way it should be ;)
A progress bar for human thinking processes could be pretty useful, don't you think? Everyone would know whether there's enough time to go get a cu...
View full detailsThis nerdy Cooling Please Wait Trivet ensures that all sensitive surfaces in your household are spared from hot pots, casseroles and pans. There's ...
View full detailsWho tells us what is right and what is wrong? Or is right not right and wrong right? A matter of opinion?
What's the most popular answer to calls at the IT support hotline? Of course the sentence: "Have you tried turning it off and on again?&q...
View full detailsHaven't geeks always known that computers are better than sex?
Turns out that most nerds do actually care about nature and know a lot about the evil “outside world”. So much so that even parts of the Unix archi...
View full detailsYour external hard drive is droning and blinking even though it's in standby mode... Doh! Those USB gadgets can only be turned off by unpluggi...
View full detailsThis product is only available in German.
Fun fact: The Windows XP operating system was the first to use product activation keys to reduce software piracy. An activation by phone or online ...
View full detailsHave you ever thought about the proper way to drink coffee? Sure, you might think: "Pour coffee into the mug, lift the mug, drink, repeat as necess...
View full detailsAfter many fans of Blizzard and the "World of Warcraft" expansion "Battle for Azeroth" were more than disappointed, a lot has now been made good wi...
View full details"You are dumb" in binary ASCII-code.The right answer to all DAU questions (including the one on what's written on your T-shirt): You are dumb! ;-)
Imagine arriving at the office, sitting down at your desk in order to do all the important bug fixes , whilst sipping your coffee... when all of t...
View full details