Computer science shirts and computer science articles
It is surprisingly easy to hack into other computer systems, often a simple phone call does the trick: "Hello, I am your system administrator. I ne...
View full detailsBefore annoying other people with technical questions, you should perhaps take a look at the manual yourself. The next time you're asked, you can p...
View full detailsParticularly talented coders are not satisfied with writing their own code, but also try to analyze other programs and hardware, e.g. to write driv...
View full detailsThis button should be part of the wardrobe of every person who is even remotely involved with computers. Because this fact does not automatically t...
View full detailsIf you think that a shell is a shell and only think of video games when you think of consoles, then this shirt is not necessarily for you. But if y...
View full detailsLet's keep our computers clean and make sure Unicode doesn't get a chance! Things like Unicode undermine our good nerd values. If we really think a...
View full detailsThe command [i]export EDITOR=""[/i] defines the editor that is used by other applications by default to open files. The abbreviation [i]rm[/i], how...
View full detailsSorry to all 1337 h4x0r, but this had to be said :) If you don't understand what it says on the shirt, consider yourself lucky. Nevertheless, here ...
View full detailsFor the code monkeys among you ;-)
With this shirt, the user world will tremble before you! More info here
Whether it's the software, hardware or the analog world outside the computer - sometimes, when things have gotten too convoluted and overheated, al...
View full detailsWhat the Force is to Jedis, the source code is to computer scientists. If you control it, you basically control everything. But remember: with grea...
View full detailsYou haven't started OpenOffice for months because you write your own letters in latex? Then you shouldn't hesitate and get yourself this T-shirt!
On your back, of course Aren't we all a bit HTML?
There are simply too many DAUs, so the only thing that helps is a general rejection if you don't want to keep answering stupid questions or uninsta...
View full detailsIt decides what you can and cannot do. Seemingly omnipotent, he simply blocks your user account or deletes all your data. Whatever you do - he sees...
View full detailsDon't you sometimes feel like a completely fresh program when you're out and about in real life?
At some point, there has to be an end to the stupid "Connection reset by peer"
Based on a true story: "Look mom, with the new router you no longer need cables and can use Wi-Fi anywhere in the house." - "Can I use it to write ...
View full detailsUh Oh...You wouldn't want to be the admin of the database...
Unit tests are for beginners, test environments are overrated and the last deploy was... adventurous? Then Test in Production is exactly your style...
View full detailsIt's the weekend - or late at night - you're gaming, binging or dozing. Suddenly your cell phone rings. That can only mean one thing: your mother i...
View full detailsIn principle, we nerds shouldn't have any problems with curfews in any type of game - after all, we're usually sitting at home in front of the comp...
View full detailsThis year's Hacken Open Air line-up is once again second to none: The headliners sudo's Priest and Gnutallica will heat you up on the Black Hat Sta...
View full detailsLinux has the penguin, BSD has the daemon, Perl has the camel and the hacker community has this symbol, called the glider. It is still young, but i...
View full detailsAre HEX numbers your bread and butter? Then you should have little problem understanding the subtle message of this shirt. Otherwise, just think a ...
View full detailsTwo rules for life is a dry statement for anyone who refuses access when they hear "Details please". The clear typo print sums up the humor of IT, ...
View full detailsThe security principle "[i]Security by Obscurity[/i]" from the field of computer and network security is based on the assumption that a system cann...
View full detailsWithout words
Fun fact: With Windows XP, Microsoft used the product activation system with serial numbers for the first time in order to curb software piracy. Ac...
View full detailsIn a world full of tracking, data leaks and transparent citizens, one simple truth applies:Encryption is not a crime - it's self-defense.Just becau...
View full detailsWho understands women... Even Unix doesn't know what to do.
Why didn't anyone tell Jesus that backups are important?
Some people recognize their age by their back pain. We nerds recognize it by the moment when we want to save a file and briefly think: "Where is ac...
View full detailsYou're looking forward to your long-deserved vacation, book a hotel that mentions something about "Internet access" in the brief description and se...
View full detailsFor the real computer scientists ;)