1
300
Not a Number (jemmy.jeena.net)
submitted 1 day ago by [email protected] to c/[email protected]

Good price.

2
190
Every single time (programming.dev)
submitted 3 days ago by [email protected] to c/[email protected]
3
297
submitted 3 days ago by [email protected] to c/[email protected]
4
125
stupidestAdvertisingEver (kbin.melroy.org)
submitted 3 days ago by [email protected] to c/[email protected]

Like, do they not worry about people just editing everything and inserting porn or something? I doubt that they were smart enough to use branch protection. To be fair, when you're sending a mass spam campaign, you already don't worry about your reputation anyway lol

(The attached images: part 1: @QuantEssential-io has invited you to collaborate on the QuantEssential-io/Quant-Interview-Prep-2024 repository part 2: GitHub 404 showing the entire organization has been banned)

5
1265
submitted 5 days ago by [email protected] to c/[email protected]
6
247
submitted 4 days ago by [email protected] to c/[email protected]
7
153
Go vs Rust learning (programming.dev)
submitted 4 days ago by [email protected] to c/[email protected]
8
270
submitted 5 days ago* (last edited 5 days ago) by [email protected] to c/[email protected]
9
76
submitted 5 days ago by [email protected] to c/[email protected]
10
148
submitted 6 days ago by [email protected] to c/[email protected]
11
95
submitted 6 days ago by [email protected] to c/[email protected]

When I read the sentence, I was like "Wh... w... how? WHY? ...and OF COURSE it was distributed via FTP, I mean, what else do you use for entertainment in AIX. Or business, for that matter."

(Abuse)

12
55
submitted 6 days ago by [email protected] to c/[email protected]

BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the 'mp3' program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as 'telnet', which is used by hackers to connect to machines on the internet without using a telephone.

13
450
Bug fixing ways (infosec.pub)
submitted 1 week ago by [email protected] to c/[email protected]
14
147
submitted 1 week ago by [email protected] to c/[email protected]
15
143
submitted 1 week ago by [email protected] to c/[email protected]
16
147
js Monk and Fly (sh.itjust.works)
submitted 1 week ago by [email protected] to c/[email protected]
17
144
submitted 1 week ago by [email protected] to c/[email protected]
18
145
Certified in AI (sh.itjust.works)
submitted 1 week ago by [email protected] to c/[email protected]
19
144
Let's do micro service (sh.itjust.works)
submitted 1 week ago by [email protected] to c/[email protected]
20
145
I am a sinner (sh.itjust.works)
submitted 1 week ago by [email protected] to c/[email protected]
21
147
submitted 1 week ago by [email protected] to c/[email protected]
22
145
submitted 1 week ago by [email protected] to c/[email protected]
23
20
submitted 1 week ago by [email protected] to c/[email protected]
24
440
AI Suggestions (programming.dev)
submitted 1 week ago by [email protected] to c/[email protected]
25
142
I still don't get buffers (programming.dev)
submitted 1 week ago by [email protected] to c/[email protected]
view more: next ›

Programmer Humor

17605 readers
266 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 11 months ago
MODERATORS