Geek Clothing: Nerd Shirts & Geek Shirts
The word 'hacker' in Japanese, on a T-shirt. The characters are pronounced "hakka" (with a short pause between the k: "hak...
View full detailsAnyone who's ever developed a program knows that just because it works on one person's computer, doesn't means it works on another! Given the almos...
View full detailsLook again!Even on t-shirts, the number of bugs increases by the day. All getDigital t-shirts are of course way past the beta phase ;)
"Too many cooks spoil the broth!" - a principle that not only applies in the kitchen but also the world of IT. When it comes to identifying former ...
View full detailsThis shirt based on the jurassic park logo is a tribute to all the brave admins combating outdated systems, inexplicable server failures and of cou...
View full detailsAt times, we reach the point where our brain just refuses to function properly and even the simplest tasks are impossible to complete. Most program...
View full detailsSometimes you just need a little longer to sort out your thoughts. Just point to the button and finish thinking. That way everyone knows and you ha...
View full detailsOn January 19, 2038, exactly on 03:14:07 (GMT) the 32-bit Unix time variable will be completely filled!Unix-like systems store the time as the numb...
View full detailsIf you ever meet a colour-blind robot, it will be useful to have the hex code the same colour of your shirt written on it :)The writing #000000 is ...
View full detailsLinux - The choice of the GNU generation.
All users of a unix-like operating systems (Linux, Mac, BSD, etc) should know what a fork bomb is. A fork bomb is a program which creates so many c...
View full detailsProgrammers who use pointers should be careful because they aren't far away from hell ;) At least that's what the 2nd of the 10 commandme...
View full detailsAhh, nothing beats a well-organized home, right? Everything exactly where it belongs, all the books organized by the astronomical sign of the autho...
View full detailsWhat's the trick behind all the software and where does it come from? That's what we asked ourselves and then we went on a investigation....
View full detailsAn answer to every single newbee question... Now you do not even have to make the effort to open your mouth!For those who do not know (and are afra...
View full detailsIt's safe to say that without IT specialists, the world as we know it could hardly function. Most aspects of our lives, whether we realize it or no...
View full detailsTo be or not to be, that is the question.2b, or not 2b, that is the question./(bb|[^b]{2})/ We knew it: coders are poets. If only Shakespeare had b...
View full detailsWe really don't know what evolution was thinking with zebras! Ok, maybe the stripes help against flies, in the heat or confuse predators. But let's...
View full detailsSure, table based layouts should be avoided at all costs, but, if you ever make a layout for Firefox which took several hours of hard work and trie...
View full detailsSometimes it's astonishingly easy to hack into other computer systems. Just pick up your phone and say: "Hi. This is your system administ...
View full detailsAt times, one can get the impression that in many software companies, one department does not know what the other is doing and vice versa. For exam...
View full detailsLet's be honest: anyone who needs additional explanations besides the code wouldn't understand your explanations anyway. The next time someone asks...
View full detailsWho tells us what is right and what is wrong? Or, maybe, right is not right, and wrong is right!? Maybe it's a matter of opinion?
Who knew that two small words could make a seasoned programmer sweat and shiver in fear? Simply utter "syntax error" to reduce anyone who works in ...
View full detailsNow you can attach your own power button to all kinds of things. Get ready to add new features to apples, books, jackets and bags.
pi * thumb = 42-thumb = 42/pi-thumb = ~13.3742 is the answer to everything, as we know – life, the universe and everything. And, as we know, 1337 ...
View full detailsIsn't it a good feeling to have power over hardware users? Of course, backups don't help against a real admin, but users won't reali...
View full detailsIt's not enough for talented coders to write their own code, they try to analyze other programs and hardware too! For example, they'll wr...
View full detailsWhat the Force is to Jedis, the source code is to computer scientists. If you control it, you basically control everything. But remember: with grea...
View full detailsAre HEX-Numbers part of your everyday life? Then you should understand the subtle message of this t.shirt without problems. In any other case, just...
View full detailsIf you think shells live on the beach, and a console to you is a video game, this shirt is probably not really meant for you. But... if you have ev...
View full detailsGiven that the binary system is widely used in IT (and thus in most parts of our lives), surprisingly few people actually understand the combinatio...
View full detailsThe command export EDITOR="" is used to set the default editor. The short; rm, means nothing more than to "remove"..So, if anot...
View full detailsSo, your computer centre urgently needs better security? Are you perfectly qualified for the job? Then don't hesitate: Become a member of the ...
View full detailsFor all those code monkeys among you ;-)