Password Jokes / Recent Jokes
1. Word processors never display a cursor.
2. You never have to use the space-bar when typing long sentences.
3. All monitors display inch-high letters.
4. High-tech computers, such as those used by NASA, the CIA, or some such governmental institution, will have easy-to-understand graphical interfaces.
5. Those that don't will have incredibly powerful text-based command shells that can correctly understand and execute commands typed in plain English.
6. Corollary: You can gain access to any information you want by simply typing "ACCESS ALL OF THE SECRET FILES" on any keyboard.
7. Likewise, you can infect a computer with a destructive virus by simply typing "UPLOAD VIRUS." (See "Fortress")
8. All computers are connected. You can access the information on the villain's desktop computer, even if it's turned off.
9. Powerful computers beep whenever you press a key or more...
My kids love going to the Web, and they keep track of their passwords by writing them on Post-it notes. I noticed their Disney password was "MickeyMinnieGoofyPluto," and asked why it was so long. "Because," my son explained, "they say it has to have at least four characters."
My kids love going to the Web, and they keep track of their passwords by writing them on Post-it notes. I noticed their Disney password was written:"MickeyMinnieGoofyPluto"I had to ask why it was so long."Because," my son explained, "they say it has to have at least four characters."
I know Daddy's password! While my brother-in-law was tapping away on his home computer, his ten-year-old daughter sneaked up behind him. Then she turned and ran into the kitchen, squealing to the rest of the family, 'I know Daddy's password! I know Daddy's password!'
'What is it? her sisters asked eagerly.
Proudly she replied, 'Asterisk, asterisk, asterisk, asterisk, asterisk!'
9. E-mail flames from some guy named "Fluffy."
8. Traces of kitty litter in your keyboard.
7. You find you've been subscribed to strange newsgroups like alt. recreational. catnip.
6. Your mouse has teeth marks in it... and a strange aroma of tuna.
5. Hate-mail messages to Apple Computers, Inc. about thier release of "CyberDog."
4. Your new ergonomic keyboard has a strange territorial scent to it.
3. You keep finding new software around your house like CatinTax and WarCat II.
2. On IRC you're known as the IronMouser.
and the #1 Sign Your Cat Has Learned Your Internet Password...
1. Little kitty carpal-tunnel braces near the scratching post.
Word processors never display a cursor.
You never have to use the space-bar when typing long sentences.
All monitors display inch-high letters.
High-tech computers, such as those used by NASA, the CIA, or some such governmental institution, will have easy to understand graphical interfaces. Those that don't, have incredibly powerful text-bases command shells that can correctly understand and execute commands typed in plain English.
Corollary: you can gain access to any information you want by simply typing "ACCESS ALL OF THE SECRET FILES" on any keyboard.
Likewise, you can infect a computer with a destructive virus by simply typing "UPLOAD VIRUS" (see "Fortress").
All computers are connected. You can access the information on the villain's desktop computer, even if it's turned off.
Powerful computers beep whenever you press a key or whenever the screen changes. Some computers also slow down the output on the screen so that it more...
Word processors never display a cursor.
You never have to use the space-bar when typing long sentences.
Movie characters never make typing mistakes.
All monitors display inch-high letters.
High-tech computers, such as those used by NASA, the CIA or some such governmental institution, will have easy to understand graphical interfaces.
Those that don't have graphical interfaces will have incredibly powerful text-based command shells that can correctly understand and execute commands typed in plain English.
Note: Command line interfaces will give you access to any information you want by simply typing, "ACCESS THE SECRET FILES" on any near-by keyboard.
You can also infect a computer with a destructive virus by simply typing "UPLOAD VIRUS". (See "Fortress".)
All computers are connected. You can access the information on the villain's desktop computer even if it's turned off.
Powerful computers beep whenever you press a key more...