1
272
Not a Number (jemmy.jeena.net)
submitted 22 hours ago by [email protected] to c/[email protected]

Good price.

2
185
Every single time (programming.dev)
submitted 2 days ago by [email protected] to c/[email protected]
3
288
submitted 3 days ago by [email protected] to c/[email protected]
4
123
stupidestAdvertisingEver (kbin.melroy.org)
submitted 3 days ago by [email protected] to c/[email protected]

Like, do they not worry about people just editing everything and inserting porn or something? I doubt that they were smart enough to use branch protection. To be fair, when you're sending a mass spam campaign, you already don't worry about your reputation anyway lol

(The attached images: part 1: @QuantEssential-io has invited you to collaborate on the QuantEssential-io/Quant-Interview-Prep-2024 repository part 2: GitHub 404 showing the entire organization has been banned)

5
554
submitted 4 days ago by [email protected] to c/[email protected]
6
1243
submitted 4 days ago by [email protected] to c/[email protected]
7
230
Go vs Rust learning (programming.dev)
submitted 4 days ago by [email protected] to c/[email protected]
8
495
submitted 5 days ago* (last edited 5 days ago) by [email protected] to c/[email protected]
9
76
submitted 4 days ago by [email protected] to c/[email protected]
10
146
submitted 6 days ago by [email protected] to c/[email protected]
11
96
submitted 6 days ago by umbraroze to c/[email protected]

When I read the sentence, I was like "Wh... w... how? WHY? ...and OF COURSE it was distributed via FTP, I mean, what else do you use for entertainment in AIX. Or business, for that matter."

(Abuse)

12
53
submitted 6 days ago by [email protected] to c/[email protected]

BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the 'mp3' program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as 'telnet', which is used by hackers to connect to machines on the internet without using a telephone.

13
495
Bug fixing ways (infosec.pub)
submitted 1 week ago by [email protected] to c/[email protected]
14
219
submitted 1 week ago by [email protected] to c/[email protected]
15
194
submitted 1 week ago by [email protected] to c/[email protected]
16
274
js Monk and Fly (sh.itjust.works)
submitted 1 week ago by [email protected] to c/[email protected]
17
275
submitted 1 week ago by [email protected] to c/[email protected]
18
232
Certified in AI (sh.itjust.works)
submitted 1 week ago by [email protected] to c/[email protected]
19
599
Let's do micro service (sh.itjust.works)
submitted 1 week ago by [email protected] to c/[email protected]
20
148
I am a sinner (sh.itjust.works)
submitted 1 week ago by [email protected] to c/[email protected]
21
288
submitted 1 week ago by [email protected] to c/[email protected]
22
286
submitted 1 week ago by [email protected] to c/[email protected]
23
20
submitted 1 week ago by [email protected] to c/[email protected]
24
741
AI Suggestions (programming.dev)
submitted 1 week ago by [email protected] to c/[email protected]
25
534
I still don't get buffers (programming.dev)
submitted 1 week ago by [email protected] to c/[email protected]
view more: next ›

Programmer Humor

17557 readers
389 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 11 months ago
MODERATORS