Products
Everyone who speaks a language with special characters knows the problem: Wrong encoding.
The main assumption of the computer and network security principle "[i]security by obscurity[/i]" is that a system cannot be compromised if nobody ...
View full detailsThere was little competition for the NES among 16-bit games consoles, but the Sega Mega Drive was definitely one of them. It ran iconic classic gam...
View full detailsWithout words.
Uh Oh...Moments where you do not want to be the database admin...
To be or not to be, that is the question.2b, or not 2b, that is the question./(bb|[^b]{2})/ We knew it: coders are poets. If only Shakespeare had b...
View full detailsFor all those code monkeys among you ;-)
Sometimes it's astonishingly easy to hack into other computer systems. Just pick up your phone and say: "Hi. This is your system administ...
View full detailsThis quote by Linus is dead-on :)
Sometimes all it takes is four little boys from Colorado to brighten up even the gloomiest working day. With the Southpark XL mouse pad, you can br...
View full detailsImagine that you’ve just created a model that allows different technical systems to communicate with each other and that features different layers ...
View full detailsThe (almost exclusively jokingly used) eighth layer of the OSI model for network protocols is a nice way of saying that the problem lies with the p...
View full detailsTranslated into "normal language", the T-shirt text would read something like "Please stay at home. Don't broadcast /connect with everyone". For ex...
View full detailsSome things are best left to the professionals. This also applies to “just quickly pulling the plug.” So never—NEVER—enter the server room uninvite...
View full detailsBasically, programming has a lot in common with Lego: on the one hand, it's worth starting at a young age (keyword: practice early.), on the other ...
View full detailsBasically, programming has a lot in common with Lego: on the one hand, it's worth starting as a child (keyword: practice early), on the other hand,...
View full detailsThe back says ACK.SYN/ACK are the "commands" that the TCP/IP protocol uses to establish every connection.
Mechanical keyboards are outstanding writing instruments. The typing experience on a Das Keyboard, a Filco or a Leopold is incomparable: fast, ligh...
View full detailsMechanical keyboards are outstanding writing instruments. The typing experience on a Das Keyboard, a Filco or a Leopold is incomparable: fast, ligh...
View full detailsIt's the weekend - or late at night - you're gaming, binging, or dozing off. Suddenly, your phone rings. It can only mean one thing: your mother is...
View full detailsAs we all know, a good computer scientist knows how to achieve a certain goal with as little effort as possible. According to Bill Gates, a lazy pe...
View full detailsComments in code are massively overrated. Those who are in the know don't need extra explanations.
When the work is done, everything runs as you imagine it. So much for the theory of programming...When you have to change the code in a few months'...
View full detailsOn January 19, 2038, exactly on 03:14:07 (GMT) the 32-bit Unix time variable will be completely filled!Unix-like systems store the time as the numb...
View full detailsWhat sounds like a joke to today's generations was once an absolute revolution: a data carrier made of cardboard that is inserted into a drive. 80 ...
View full detailsIf you don't get this one, you belong to the rest... ;-) If there's a slight smile on your face though, you should probably think about h...
View full detailsLook again!Even on t-shirts, the number of bugs increases by the day. All getDigital t-shirts are of course way past the beta phase ;)
[i]"Is your computer running low on disk space? Are old holiday pictures and text documents clogging your hard drive? Then simply put everything in...
View full detailsHome sweet home. Nobody likes to sit in front of strange computers where nothing is where it should be ;)
A progress bar for thought processes would be really useful. It would let everyone involved know when it's okay to get another cup of coffee and wh...
View full detailsThis nerdy trivet Cooling Please Wait ensures that all sensitive surfaces in your household are spared from hot pots, casserole dishes and pans. Th...
View full detailsSometimes you don't need modern graphics or hyper-realistic textures to create icons - sometimes all you need is a glowing grille, a soundtrack by ...
View full detailsWho tells us what is right and what is wrong? Or, maybe, right is not right, and wrong is right!? Maybe it's a matter of opinion?
What's the most popular answer to calls at the IT support hotline? Of course the sentence: "Have you tried turning it off and on again?&q...
View full detailsGeeks have known this for a long time now: computers are better than sex....
Turns out that most nerds do actually care about nature and know a lot about the evil “outside world”. So much so that even parts of the Unix archi...
View full details