Geek Clothing: Nerd Shirts & Geek Shirts
What sounds like a joke to today's generation was once an absolute revolution: a data carrier made of cardboard that is inserted into a drive. 80 k...
View full detailsDespite the fact that the binary system is frequently used in computer science (and therefore in many areas of our lives), very few people know wha...
View full detailsIt is surprisingly easy to hack into other computer systems, often a simple phone call does the trick: "Hello, I am your system administrator. I ne...
View full detailsIf you think that a shell is a shell and only think of video games when you think of consoles, then this shirt is not necessarily for you. But if y...
View full detailsBefore annoying other people with technical questions, you should perhaps take a look at the manual yourself. The next time you're asked, you can p...
View full detailsParticularly talented coders are not satisfied with writing their own code, but also try to analyze other programs and hardware, e.g. to write driv...
View full detailsIn IT, it's called a data center - the sacred place where servers hum and data races through cables. But what if the data center is meant literally...
View full detailsThis button should be part of the wardrobe of every person who is even remotely involved with computers. Because this fact does not automatically t...
View full detailsThe command [i]export EDITOR=""[/i] defines the editor that is used by other applications by default to open files. The abbreviation [i]rm[/i], how...
View full detailsLet's keep our computers clean and make sure Unicode doesn't get a chance! Things like Unicode undermine our good nerd values. If we really think a...
View full detailsFor the code monkeys among you ;-)
Whether it's the software, hardware or the analog world outside the computer - sometimes, when things have gotten too convoluted and overheated, al...
View full detailsSorry to all 1337 h4x0r, but this had to be said :) If you don't understand what it says on the shirt, consider yourself lucky. Nevertheless, here ...
View full detailsWhat the Force is to Jedis, the source code is to computer scientists. If you control it, you basically control everything. But remember: with grea...
View full detailsUnit tests are for beginners, test environments are overrated and the last deploy was... adventurous? Then Test in Production is exactly your style...
View full detailsIt decides what you can and cannot do. Seemingly omnipotent, he simply blocks your user account or deletes all your data. Whatever you do - he sees...
View full detailsTwo rules for life is a dry statement for anyone who refuses access when they hear "Details please". The clear typo print sums up the humor of IT, ...
View full detailsDon't you sometimes feel like a completely fresh program when you're out and about in real life?
There are simply too many DAUs, so the only thing that helps is a general rejection if you don't want to keep answering stupid questions or uninsta...
View full detailsUh Oh...You wouldn't want to be the admin of the database...
This year's Hacken Open Air line-up is once again second to none: The headliners sudo's Priest and Gnutallica will heat you up on the Black Hat Sta...
View full detailsBased on a true story: "Look mom, with the new router you no longer need cables and can use Wi-Fi anywhere in the house." - "Can I use it to write ...
View full detailsAt some point, there has to be an end to the stupid "Connection reset by peer"
It's the weekend - or late at night - you're gaming, binging or dozing. Suddenly your cell phone rings. That can only mean one thing: your mother i...
View full detailsSome people recognize their age by their back pain. We nerds recognize it by the moment when we want to save a file and briefly think: "Where is ac...
View full detailsIn principle, we nerds shouldn't have any problems with curfews in any type of game - after all, we're usually sitting at home in front of the comp...
View full detailsLinux has the penguin, BSD has the daemon, Perl has the camel and the hacker community has this symbol, called the glider. It is still young, but i...
View full detailsAre HEX numbers your bread and butter? Then you should have little problem understanding the subtle message of this shirt. Otherwise, just think a ...
View full detailsThe security principle "[i]Security by Obscurity[/i]" from the field of computer and network security is based on the assumption that a system cann...
View full detailsWithout words
Do you remember that sound? That iconic screech, hiss and beep while your modem painfully dialed into the internet - and you sat there hoping that ...
View full detailsIn a world full of tracking, data leaks and transparent citizens, one simple truth applies:Encryption is not a crime - it's self-defense.Just becau...
View full detailsFun fact: With Windows XP, Microsoft used the product activation system with serial numbers for the first time in order to curb software piracy. Ac...
View full details