Hacker=Knowlegde Qoute


 
Thread Tools Search this Thread
The Lounge What is on Your Mind? Hacker=Knowlegde Qoute
# 1  
Old 06-27-2008
Hacker=Knowlegde Qoute (White hat)

I don't know if anyone has seen this commercial, either on TV or on the internet, but it's an IBM Linux Prodigy commercial.
Linux Prodigy

At around 33 seconds there is a quote about collecting and sharing data. A couple of friends and I watched this and decided to try to create a list of HACKER=KNOWLEDGE type quotes. But we want to expand the list. We accidentally lost our list and are trying to refill it.

We came up with this one:
Knowledge cannot be seen, but can be shared.
Another is:
Imagine the world as a giant cell. Each human as a part of the DNA. Every thought has an opposite(A to T : G to C). But only when every part of the DNA is put together can it become complete. And only when it is complete can knowledge be created.

Last edited by Texasone; 06-27-2008 at 02:52 AM.. Reason: youtube viewing
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. Linux

Ssh login with random qoute banner

I'll be honest here The one and only time I have done LDAP user and login configuration was for my RHCSA exam, and that was many years ago I have this interview coming up (for a linux admin position role), and while the other questions I have no problem answering I am stuck with this (image... (5 Replies)
Discussion started by: hedkandi
5 Replies

2. What is on Your Mind?

I want to be a white-hat hacker!

HI, i want to be a white hacker(those who use their skills in ethical hacking) for that what all languages do i need to know i am working in an IT company and its paying me well, i just want to learn it because it has always attracted me..i know c,c++,shell,little bit html what else do... (13 Replies)
Discussion started by: shekhar_4_u
13 Replies

3. Shell Programming and Scripting

want to remove comma present inside double qoute

Hi friends... I have a dat file like below:- test_file.dat abc,ttt,"""123,89.98",yyu,opp vvv,"23,76.68",w564,"54,98.87",985 i need the remove the comma present inside the double qoute as output:- out_test_file.dat abc,ttt,"""12389.98",yyu,opp vvv,"2376.68",w564,"5498.87",985... (6 Replies)
Discussion started by: gani_85
6 Replies

4. Shell Programming and Scripting

remove files with 0 size, space and double qoute

os=hpux11 shell=ksh some jokers had written thousands of empty files into my $HOME. and the files are named inconsistently that some of them include space and double qoutes. all those files are of 0 size (when i did ls -al it told me so). the naming paterns are like e.g of ls -al output: ... (3 Replies)
Discussion started by: nongrad
3 Replies
Login or Register to Ask a Question
Mono(signcode)															    Mono(signcode)

NAME
signcode - Digitally sign an PE executable using an X.509 certificate. SYNOPSIS
signcode [options] filename DESCRIPTION
Digitally sign an PE executable (CLR assembly, Win32 EXE or DLL) using an X.509 certificate and it's associated private key. The signature is compatible with Authenticode(r) and can be validated with chktrust (either on Windows or on any platform supported by Mono). OPTIONS
-spc spcfile The Software Publisher File (spc) that contains the X.509 certificate chain used to digitally sign the PE executable. -v pvkfile The Private Key File (pvk) that contains the private key used to digitally sign the PE executable. This private key must match the public key inside the publisher X.509 certificate. -a md5 | sha1 The hash algorithm used in the digital signature of the PE executable. The default algorithm is MD5. -$ individual | commercial Add information about the publisher, i.e. if the signature is generated by an individual or a commercial entity. -n description Add a textual description of the signed file. -i url Add a URL associated to the publisher or the signed file. -t url URL to a timestamp service to countersign the PE executable. Countersignature is required if you want the PE executable signature to be valid after the publisher certificate expires. The countersignature proves that the publisher had a valid (non-expired) certifi- cate when the PE executable was signed. -tr # Number of retries to get a timestamp for the countersignature. -tw # Delay (in seconds) between the retries to get a timestamp for the countersignature. -k name CryptoAPI key container name (when not using -v). -p name CryptoAPI provider name (when not using -v). -y # CryptoAPI provider type (when not using -v or -p). -ky signature | exchange | # CryptoAPI key type (when not using -v). -r localMachine | currentUser CryptoAPI key location (when not using -v). -help , -h , -? , /? Display help about this tool. OTHER CODE SIGNING TECHNOLOGIES
Assemblies are PE files that can also be strongnamed using the sn.exe tool. The order of code signature is important if a file requires both an Authenticode and a strongname signature. Strongname must be applied before the Authenticode signature. Applying a strongname after the Authenticode signature, like re-signing an assembly (e.g. delay-sign), will invalidate the Authenticode signature. KNOWN RESTRICTIONS
signcode cannot generate Authenticode signatures for CAB files. AUTHOR
Written by Sebastien Pouliot COPYRIGHT
Copyright (C) 2003 Motus Technologies. Copyright (C) 2004 Novell. Released under BSD license. MAILING LISTS
Visit http://lists.ximian.com/mailman/listinfo/mono-devel-list for details. WEB SITE
Visit http://www.mono-project.com for details SEE ALSO
chktrust(1),makecert(1),cert2spc(1) Mono(signcode)