Technology Jokes

Password Selection Directive

CORPORATE DIRECTIVE NUMBER 88-570471 In order to increase the security of all company computing facilities, and to avoid the possibility of unauthorized use of these facilities, new rules are being put into effect concerning the selection of passwords. All users of computing facilities are instructed to change their passwords to conform to these rules immediately. RULES FOR THE SELECTION OF PASSWORDS:
1. A password must be at least six characters long, and must not contain two occurrences of a character in a row, or a sequence of two or more characters from the alphabet in forward or reverse order. Example: HGQQXP is an invalid password. GFEDCB is an invalid password.
2. A password may not contain two or more letters in the same position as any previous password. Example: If a previous password was GKPWTZ, then NRPWHS would be invalid because PW occurs in the same position in both passwords.
3. A password may not contain the name of a month or an abbreviation for a month. Example: MARCHBC is an invalid password. VWMARBC is an invalid password.
4. A password may not contain the numeric representation of a month. Therefore, a password containing any number except zero is invalid. Example: WKBH3LG is invalid because it contains the numeric representation for the month of March.
5. A password may not contain any words from any language. Thus, a password may not contain the letters A, or I, or sequences such as AT, ME, or TO because these are all words.
6. A password may not contain sequences of two or more characters which are adjacent to each other on a keyboard in a horizontal, vertical, or diagonal direction. Example: QWERTY is an invalid password. GHNLWT is an invalid password because G and H are horizontally adjacent to each other. HUKWVM is an invalid password because H and U are diagonally adjacent to each other.
7. A password may not contain the name of a person, place, or thing. Example: JOHNBOY is an invalid password.
Because of the complexity of the password selection rules, there is actually only one password which passes all the tests. To make the selection of this password simpler for the user, it will be distributed to all supervisors. All users are instructed to obtain this password from his or her supervisor and begin using it immediately.

Copyright © 2013 - All Rights Reserved - Used with Permission.
Anonymous

Top Ten Signs Your Coworker Is A Computer Hacker

10. You ticked him off once and your next phone bill was $20,000.
9. He's won the Publisher's Clearing House sweepstakes three years running.
8. When asked for his phone number, he gives it in hex.
7. Seems strangely calm whenever the office LAN goes down.
6. Somehow he/she gets HBO on his PC at work.
5. Mumbled, "Oh, puh-leeez" 95 times during the movie "The Net"
4. Massive RRSP contribution made in half-cent increments.
3. Video dating profile lists "public-key encryption" among turn-ons
2. When his computer starts up, you hear, "Good Morning, Mr. President."
1. You hear him murmur, "Let's see you use that Visa card now, jerk."

Copyright © 2013 - All Rights Reserved - Used with Permission.
Anonymous

Software Development Process

Software Development Process

  1. Order the T-shirts for the Development team
  2. Announce availability
  3. Write the code
  4. Write the manual
  5. Hire a Product Manager
  6. Spec the software (writing the specs after the code helps to ensure that the software meets the specifications)
  7. Ship
  8. Test (the customers are a big help here)
  9. Identify bugs as potential enhancements
  10. Announce the upgrade program

Copyright © 2013 - All Rights Reserved - Used with Permission.
Anonymous