CyberJoke Friday v1.2

Enjoy Cyberjoke Friday Aug, 7, 2015 …


There is this Cartoon:



Found Al Lowe’s humor site – he has a few good Cyber Jokes.  here are 2 that I liked.

Joke #3198:

Two computer geeks were talking. “Guess what?” said one. “What?” said the other. “Yesterday, I met a gorgeous blonde in a bar.” “Really? How’d it go?” “Great. I invited her to my place, we had some drinks, she got into the mood, and she asked me to undress her.” “Whoa.” “Yeah. I took off her dress, picked her up, and put her on my desk beside my new laptop.” “No kidding! You got a new laptop?!”

Joke #2204:

There’s so much sadness in this world. For example, right now, as you read this, 17 million Americans are having sex, but you’re on the computer!


Out of the 17 Computer Jokes   these 3 stand out to me:


Q: How many programmers does it take to change a light bulb?
A: None. It’s a hardware problem.

“I’m not interrupting you, I’m putting our conversation in full-duplex mode.”
– Antone Roundy

Computers make very fast, very accurate mistakes.




Cyber Joke Friday v1.1 #Cybersecurity

A great Murphy’s law site on the Net:

All murphy’s laws, but I want to focus on computers… and specifically Cybersecurity


Compiled the 6 of them on my top10…

murphyslaw in cybersecurity



First the only “security” mentions

* Law of Anti-security
The best way past a pesky security feature is a 13-year-old.

* Lulled into Security Law
A ‘debugged’ program that crashes will wipe out source files on storage devices when there is the least available backup.


we can change the first one

* The best way past a pesky security feature is a Chinese hacker




Then the  classics for computers:

* If a program is useful, it will have to be changed.

Could be changed to

* If Security is effective on a computer it will be changed


Or this one:

* Any given program will expand to fill all the available memory.

how about this?

* Network traffic will fill the available bandwidth (hackers scans and DDOS)


This one:

The subtlest bugs cause the greatest damage and problems.
Corollary – A subtle bug will modify storage thereby masquerading as some other problem.

The Corollary can be changed to :

A subtle hacker will modify your system while masquerading as a legitimate program



How about this one?

* Still backing up your files? ask the NSA for restore when your restore fails



Please contact US to add to this list -also on Twitter @fixvirus




Cyber jokes Friday Edition v1.0

#10 You can take the nerd out of the cyber war room, but you can’t remove the computers.

Also a good Abbott and Costello Cyber routine:
This is a good “Cyber Joke” movie:  “The Interview”
It is pretty funny – to think that somebody hacked Sony due to their bad security practices for a movie that is  about a leader of a nation that makes him look funny.