Geek Shirts and Hoodies
Nobody likes to fix the mistakes another person has made due to incompetence, laziness or simply by accident. But when you yourself are that person...
View full detailsThis year's line-up of the Hacken Open Air is probably the best one ever: The headliners sudo's Priest and Gnutallica will set the Black Hat Stage ...
View full detailsAs we all know, hindsight is 20/20. This universally applicable wisdom can also be used to describe informatics, especially debugging (i.e. testing...
View full detailsAs we all know, silent waters run deep. While software development does not exactly have anything to do with water, the basic principle of the sayi...
View full detailsIf one were to believe the genre legends Run DMC, hip-hop really does have one thing in common with informatics: It's tricky! While the trio of Run...
View full detailsBasically, programming has a lot in common with Lego: on the one hand, it's worth starting at a young age (keyword: practice makes perfect), and on...
View full detailsThere are a few unwritten rules everybody in IT should always follow. And trust us, if you decide to ignore these rules, you definitely won't want ...
View full detailsTurns out that most nerds do actually care about nature and know a lot about the evil “outside world”. So much so that even parts of the Unix archi...
View full detailsThis year's line-up of the Hacken Open Air is probably the best one ever: The headliners sudo's Priest and Gnutallica will set the Black Hat Stage ...
View full detailsWe all know it: e-mails with incorrect encoding, in which the German special characters are once again displayed incorrectly. We can only be glad t...
View full detailsTo understand recursion, you first have to understand recursion.
The word hacker in Japanese on a shirt. The characters are pronounced "hakka" (with a small pause between the k, i.e. "hak (pause) ka").
Programmers who use pointers should be careful because they aren't far away from hell ;) At least that's what the 2nd of the 10 commandme...
View full detailsWhen programmers have worked too long on a project, or when you ask them how the code they worked on actually functions, their favorite answer will...
View full detailsComments in the code are grossly overrated. Everything is already there! If you have a plan of the matter, you don't need any extra explanations ;)
Look again!Even on t-shirts, the number of bugs increases by the day. All getDigital t-shirts are of course way past the beta phase ;)
At times, we reach the point where our brain just refuses to function properly and even the simplest tasks are impossible to complete. Most program...
View full details"Too many cooks spoil the broth!" - a principle that not only applies in the kitchen but also the world of IT. When it comes to identifying former ...
View full detailsOf course, table-based layouts are evil and should be avoided. But when you test the CSS layout you've painstakingly created for Firefox with Inter...
View full detailsWhat's the trick behind all the software and where does it come from? That's what we asked ourselves and then we went on a investigation....
View full detailsAll users of a unix-like operating systems (Linux, Mac, BSD, etc) should know what a fork bomb is. A fork bomb is a program which creates so many c...
View full detailsOn January 19, 2038, exactly on 03:14:07 (GMT) the 32-bit Unix time variable will be completely filled!Unix-like systems store the time as the numb...
View full detailsFor the code monkeys among you ;-)
Are HEX-Numbers part of your everyday life? Then you should understand the subtle message of this t.shirt without problems. In any other case, just...
View full detailsTo be or not to be, that is the question.2b, or not 2b, that is the question./(bb|[^b]{2})/ We knew it: coders are poets. If only Shakespeare had b...
View full detailsImagine that you’ve just created a model that allows different technical systems to communicate with each other and that features different layers ...
View full detailsIt's not enough for talented coders to write their own code, they try to analyze other programs and hardware too! For example, they'll wr...
View full detailsLinux - The choice of the GNU generation
Something you may not know is that computer scientists have to deal with all sorts of trees. Quite often, the most common being the so-called binar...
View full detailsIf there is any profession entirely deserving of their own drinking song, it’s programmers.The so-called “Programmer’s Drinking Song”, a modificati...
View full detailsAt times, one can get the impression that in many software companies, one department does not know what the other is doing and vice versa. For exam...
View full detailsAt least in theory, we nerds should not have problems with curfews, right? After all, we usually spend the majority of our time at home in front of...
View full detailsThis year's line-up of the Hacken Open Air is probably the best one ever: The headliners sudo's Priest and Gnutallica will set the Black Hat Stage ...
View full detailsThe command export EDITOR="" is used to set the default editor. The short; rm, means nothing more than to "remove"..So, if anot...
View full detailsLet's keep our computers clean and ban Unicode! Abominations like Unicode are destroying our good nerd-values and when you get right down to it, AS...
View full detailsWho understands women... Even Unix doesn't know what to do.