Archive for February, 2010


Real programmers… 0x1D

Real programmers don’t bring brown bag lunches to work. If the vending machine sells it, they eat it. If the vending machine doesn’t sell it, they don’t eat it. Vending machines don’t sell quiche.

The ninth video in the series from Evid3nc3. Check him out at: http://www.youtube.com/user/Evid3nc3

2.6 Deconversion: The End

“I think it is inevitable that people program poorly. Training will not substantially help matters. We have to learn to live with it.”
– Alan Perlis

Real programmers… 0x1C

Real programmers know every nuance of every instruction and use them all in every real program. Puppy architects won’t allow execute instructions to address another execute as the target instruction. Real programmers despise such petty restrictions.

The eighth video in the series from Evid3nc3. Check him out at: http://www.youtube.com/user/Evid3nc3

2.5 Deconversion: Personal Relationship (Part 1)

“If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.”
– Bruce Schneier

Real programmers… 0x1B

Real programmers like vending machine popcorn. Coders pop it in the microwave oven. Real programmers use the heat given off by the CPU. They can tell what job is running just by listening to the rate of popping.

The seventh video in the series from Evid3nc3. Check him out at: http://www.youtube.com/user/Evid3nc3

2.4 Deconversion: The Bible (Part 2)

The sixth video in the series from Evid3nc3. Check him out at: http://www.youtube.com/user/Evid3nc3

2.4 Deconversion: The Bible (Part 1)

“Hoaxes use weaknesses in human behavior to ensure they are replicated and distributed. In other words, hoaxes prey on the Human Operating System.”
– Stewart Kirkpatrick