Computer scientist shirts and hoodies
Nobody likes to fix the mistakes another person has made due to incompetence, laziness or simply by accident. But when you yourself are that person...
View full detailsThis year's line-up of the Hacken Open Air is probably the best one ever: The headliners sudo's Priest and Gnutallica will set the Black Hat Stage ...
View full detailsAs we all know, hindsight is 20/20. This universally applicable wisdom can also be used to describe informatics, especially debugging (i.e. testing...
View full detailsAs we all know, silent waters run deep. While software development does not exactly have anything to do with water, the basic principle of the sayi...
View full detailsDid you know that you can make a lot of money with compression? And we’re not talking about the inventors of WinRAR (who are most likely still wait...
View full detailsWe can all agree that it can be pretty hard keeping up with all the latest social customs. One minute you shake a person's hand when you meet them,...
View full detailsDeath, War, Pestilence and Hunger - one does not need to be familiar with the works of Albrecht Dürer to recognize this unholy quartet: The Four Ho...
View full detailsFor those of you who have comments regarding a source code: It was hard to write - it was meant to be hard to understand..
If one were to believe the genre legends Run DMC, hip-hop really does have one thing in common with informatics: It's tricky! While the trio of Run...
View full detailsRemember way back... when to be able to load programmes and games on a C64, you had to type in a special command first? For the sake of nostalgia, ...
View full details"Is your computer running low on disk space? Are old holiday pictures and text documents clogging your hard drive? Then simply put everything into ...
View full detailsThe good ol'’ floppy disk!How we loved you when you were our go-to portable, long-term memory solution. We shared so many happy years…!Not tha...
View full detailsAnyone who has ever worked in IT support will know what the following situation is like: "Can you help me? My computer crashed and I can't get to a...
View full detailsThere are a few unwritten rules everybody in IT should always follow. And trust us, if you decide to ignore these rules, you definitely won't want ...
View full detailsMany people see administrators as a kind of Matrix god. They sit in front of computers, typing away like mad in completely unspectacular looking te...
View full detailsBasically, programming has a lot in common with Lego: on the one hand, it's worth starting at a young age (keyword: practice makes perfect), and on...
View full detailsTurns out that most nerds do actually care about nature and know a lot about the evil “outside world”. So much so that even parts of the Unix archi...
View full detailsImagine arriving at the office, sitting down at your desk in order to do all the important bug fixes , whilst sipping your coffee... when all of t...
View full detailsPenguins are cool, pretty goofy and probably the only birds in the world who forgot to be birds. No other animal looks funnier waddling in the snow...
View full detailsThis year's line-up of the Hacken Open Air is probably the best one ever: The headliners sudo's Priest and Gnutallica will set the Black Hat Stage ...
View full detailsWe all know it: e-mails with incorrect encoding, in which the German special characters are once again displayed incorrectly. We can only be glad t...
View full detailsIsn't it amazing what the human brain is capable of? Not only has it secured us our place at the top of the food chain, it can also adapt extremely...
View full detailsTo understand recursion, you first have to understand recursion.
Programmers who use pointers should be careful because they aren't far away from hell ;) At least that's what the 2nd of the 10 commandme...
View full detailsEin Sysadmin schläft nicht
Anyone who's ever developed a program knows that just because it works on one person's computer, doesn't means it works on another! Given the almos...
View full detailsComments in the code are grossly overrated. Everything is already there! If you have a plan of the matter, you don't need any extra explanations ;)
Let me consider this briefly...............well, NO !Do you always need a bit of time to come up with an appropriate answer when someone else is as...
View full detailsThe word hacker in Japanese on a shirt. The characters are pronounced "hakka" (with a small pause between the k, i.e. "hak (pause) ka").
Home is still the best place to be. Who likes to sit at other people's computers where nothing is set up the way it should be ;)
When programmers have worked too long on a project, or when you ask them how the code they worked on actually functions, their favorite answer will...
View full detailsAt times, we reach the point where our brain just refuses to function properly and even the simplest tasks are impossible to complete. Most program...
View full details"Too many cooks spoil the broth!" - a principle that not only applies in the kitchen but also the world of IT. When it comes to identifying former ...
View full detailsThe back says ACK.SYN/ACK are the "commands" that the TCP/IP protocol uses to establish every connection.
All users of a unix-like operating systems (Linux, Mac, BSD, etc) should know what a fork bomb is. A fork bomb is a program which creates so many c...
View full detailsOn January 19, 2038, exactly on 03:14:07 (GMT) the 32-bit Unix time variable will be completely filled!Unix-like systems store the time as the numb...
View full details