Computer science shirts and computer science articles
There are too many newbies around. If you do not want to answer dumb questions or deinstall AOL for the 10th time, then you may want to buy this t-...
View full detailsTrue story."Look, Mum, with the new router you don't need cables anymore! Now you can use WLAN in the whole house"."So can I wr...
View full detailsAre HEX-Numbers part of your everyday life? Then you should understand the subtle message of this t.shirt without problems. In any other case, just...
View full detailsWhether you're currently sailing through the Grand Line with Luffy's crew or just planning your next binge-watching adventure – the One Piece Teles...
View full detailsAt least in theory, we nerds should not have problems with curfews, right? After all, we usually spend the majority of our time at home in front of...
View full detailsDo you want to give your Das Keyboard 5Q or Das Keyboard X50Q a completely new look? No problem! With the "Das Keyboard" key caps for mechanical ke...
View full detailsIf you regularly have to help other people with the simplest of tasks, the chances are good that you will become a BOFH, a Bastard Operator From He...
View full detailsLinus has its penguin, BSD has its demon, Perl has its camel and the hacker community uses this symbol, called Glider. It's still pretty new, ...
View full detailsUh Oh...Moments where you do not want to be the database admin...
On this “Dinokurve” T-shirt, you can see a truly unique mathematical phenomenon. As has been proven, mathematics is anything but a dry science. If ...
View full detailsAlongside sound and microphone quality, wearing comfort is probably the most important factor when choosing the perfect headset for work and gaming...
View full detailsThe main assumption of the computer and network security principle "[i]security by obscurity[/i]" is that a system cannot be compromised if nobody ...
View full detailsWithout words.
When navigating through the sheer endless expanse of the local network, inexperienced users must be careful not to lose track of the assigned IP ad...
View full detailsFun fact: The Windows XP operating system was the first to use product activation keys to reduce software piracy. An activation by phone or online ...
View full detailsThe perfect bundle for technology enthusiasts and IT insiders! With this set, you get two original products that are not only functional, but also ...
View full detailsConfident 127.0.0.1, happiness alone. With this button you can declare all kinds of things to be your home. But whether other people will accept th...
View full detailsDo you know the situation? After a long year of work, you are really looking forward to your next holiday. So you book a great hotel and you make s...
View full detailsFor all the real computer scientists ;)
It's the weekend - or late at night - you're gaming, binging, or dozing off. Suddenly, your phone rings. It can only mean one thing: your mother is...
View full detailsWhy didn't anyone tell Jesus that backups are important?
Geeks have known this for a long time now: computers are better than sex....
In a world full of tracking, data leaks, and transparent citizens, one simple truth applies:Encryption is not a crime—it is self-defense.Just becau...
View full detailsSometimes you don't need modern graphics or hyper-realistic textures to create icons - sometimes all you need is a glowing grille, a soundtrack by ...
View full detailsAs we all know, a good computer scientist knows how to achieve a certain goal with as little effort as possible. According to Bill Gates, a lazy pe...
View full detailsWith this shirt, you wipe away the last doubts:Your server - your kingdom
The gamer's kryptonite is usually everyday problems: Not enough RGB light, sticky surfaces from spilled drinks, lack of accessibility due to a dead...
View full detailsThe keyboard legend The Keyboard 4 is rightly held in high esteem by discerning users. High-quality workmanship, the best components and a design t...
View full detailsThis quote by Linus is dead-on :)
He decides what you can and cannot do. Seemingly omnipotent, he simply locks your user account or deletes all your data. Whatever you do - he sees ...
View full detailsAs keyboards were originally intended for writing texts, they usually have a practical but rather boring look. Although there are now also illumina...
View full detailsTranslated into "normal language", the T-shirt text would read something like "Please stay at home. Don't broadcast /connect with everyone". For ex...
View full detailsThere are two kinds of people: Linux user and... those other guys (people who might not understand this shirt). You will recognize them by their ab...
View full detailsMost of us have had more or less good experiences with the Excel program. It may sometimes be annoying, but it definitely has its good sides. This ...
View full details