Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    INTERNET    |    The global pornography network    |    2,155 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,967 of 2,155    |
|    August Abolins to All    |
|    cybersecurity jokes..    |
|    13 Feb 22 12:00:00    |
      MSGID: 2:221/1.58@fidonet f964f312       PID: OpenXP/5.0.51 (Win32)       CHRS: ASCII 1       TZUTC: -0500       35 Cybersecurity Jokes to Make Any Security Geek Chuckle (or        Groan)       [Posted on September 8, 2020]       [Gleened from: https://www.helpsystems.com/blog/35-        cybersecurity-jokes-make-any-security-geek-chuckle-or-groan]              Good IT jokes are few and far between, especially when it comes       to cybersecurity. That's why we put on our creativity hats to       brainstorm joke after joke - with a break to pull in a few of       our favorites from the web - for the ultimate result: the       motherlode (or should we say motherboard?) of cybersecurity       jokes and puns. P.S.: we side with Alfred Hitchcock on this       one: puns are the highest form of literature.              Everyone deserves an eye-catching intro to break the ice at the       start of a meeting or spice up a PowerPoint - gotta keep the       CEO's attention somehow! And no joke is complete without the       perfect graphic. Feel free to grab ours and include them in       your next newsletter, quarterly presentation, or for a workday       pick-me-up.              Without further ado, we present.       Our Favorite Cybersecurity Jokes of 2020              Why didn't the IT team set up their remote office from the beach?       [o] It was too cloudy.              What's a hacker's favorite season?       [o] Phishing season.              An SQL statement walks into a bar and sees two tables. It approaches and asks.       [o] "May I join you?"              What do you call a turtle that surfs the dark web?       [o] A TORtoise              What do you call an excavated pyramid?       [o] Unencrypted.              If girls are made of sugar, spice, and everything nice, and       boys are made of slime, snails, and puppy-dog tails, what's the       cloud made from?       [o] Linux servers, mostly.              What do you call a group of math and science geeks at a party?       [o] Social engineers.              Why did the programmer go to rehab?       [o] He was addicted to coding.              What's the best way to catch a runaway robot?       [o] Use a botnet.              How did the vegetable farmer sell his produce on the dark web?       [o] He used onion routing.                     Why did the programmer leave the camping trip early?       [o] There were too many bugs.              Why don't young programmers write in script these days?       [o] They were only taught Java.              What did the moderator say to kick off the IT speed dating session?       [o] "Singles, sign on!"              What do you tell a hacker after a bad breakup?       [o] There are plenty of phish in the sea!              What's one step that witches and wizards take to ensure data security?       [o] Quill testing.              Did you hear about the computer that kept rebooting?       [o] It was terminal.              Why didn't the company move into the Castle in the Sky?       [o] There wasn't enough cloud storage.              Why did the band never get a gig?       [o] It was called 1023MB              What's a programmer's least favorite Pixar movie?       [o] A Bug's Life.              How do you choose a strong password?       [o] Go to the gym and find the one lifting the heaviest weights!              What did the hacker's out of office message say?       [o] Gone phishing!              Where does a MySQL database go to relax on a hot day?       [o] A buffer pool.              How do programmers like their brownies?       [o] GUI              What are a CISO's two biggest cybersecurity fears?       [o] Everyone who works at the company. and everyone who doesn't.              What do you call a Wes Anderson movie that gets a lot of attention online?       [o] Fantastic Mr. Firefox              Why did the football team fumble the handoff?       [o] They didn't use a secure transfer method.              What happens when kids hit high school and want more independence?       [o] They start to get SaaS-y.              Why was the hacker's Californian hiking trip interrupted?       [o] There was a firewall.              Coronavirus fear is everywhere.       [o] Today I coughed on my monitor and my antivirus software started running.              Why didn't the shopper go down the canned meat aisle in the grocery store?       [o] Her SPAM filters were on.              What do you call it when only one digit steers your car?       [o] A thumb drive.              What's a secret agent's go-to fashion?       [o] Spyware.              Why did the database administrator slice a tree stump in half?       [o] He needed a binary log.              Have you heard of the band called Dark Web?       [o] They're always on tor.              After a life of cybercrime, how did the hacker get to heaven?       [o] The password hadn't been changed in 2000 years.       --- OpenXP 5.0.51        * Origin: (2:221/1.58)       SEEN-BY: 1/123 15/0 30/0 90/1 103/705 105/81 106/201 120/340 123/131       SEEN-BY: 129/305 330 331 153/7715 154/10 203/0 218/700 221/1 6 360       SEEN-BY: 226/30 227/114 229/110 206 317 400 424 426 428 452 550 664       SEEN-BY: 229/700 240/1120 5832 266/512 280/464 5003 282/464 1038 292/854       SEEN-BY: 301/0 1 101 113 123 317/3 320/219 322/757 335/364 342/200       SEEN-BY: 396/45 423/81 460/58 633/280 712/848 920/1 5020/1042 5058/104       PATH: 221/1 301/1 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca