-
It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution.
Ken Thompson -
So maybe I can go back to being a Gardeners' World addict again.
Ken Thompson
-
A well installed microcode bug will be almost impossible to detect.
Ken Thompson -
In fact, we started off with two or three different shells and the shell had life of its own.
Ken Thompson -
There are no projects per se in the Computing Sciences Research Center.
Ken Thompson -
It's always good to take an orthogonal view of something. It develops ideas.
Ken Thompson -
'I've seen visual editors like that, but I don't feel a need for them. I don't want to see the state of the file when I'm editing.'
Ken Thompson -
The X server has to be the biggest program I've ever seen that doesn't do anything for you.
Ken Thompson
-
I also have an idea for a book on biodiversity, and why and how we should be conserving it.
Ken Thompson -
The average gardener probably knows little about what is going on in his or her garden.
Ken Thompson -
In college, before video games, we would amuse ourselves by posing programming exercises.
Ken Thompson -
I still have a full-time day job, which is why it took me five years to write An Ear to the Ground, and why I won't have another book finished by next week.
Ken Thompson -
'Gigabit' seems to mean 600 megabits. It's a VAX gigabit.
Ken Thompson -
grep was a private command of mine for quite a while before i made it public.
Ken Thompson
-
When in doubt, use brute force.
Ken Thompson -
You can't trust code that you did not totally create yourself.
Ken Thompson -
Hi, this is Ken. What's the root password?
Ken Thompson -
One of my most productive days was throwing away 1,000 lines of code.
Ken Thompson -
It does everything Unix does only less reliably.
Ken Thompson -
We have persistant objects, they're called files.
Ken Thompson
-
I am a programmer.
Ken Thompson -
On the one hand, the press, television, and movies make heroes of vandals by calling them whiz kids.
Ken Thompson -
I think the open software movement (and Linux in particular) is laudable.
Ken Thompson -
Unauthorized access to computer systems is already a serious crime in a few states and is currently being addressed in many more state legislatures as well as Congress.
Ken Thompson