Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Microsoft

Bubba parodies Microsoft Bob

By John Sheesley August 27, 2008, 2:12 AM PDT

Image
1
of 19

2008-08-27_062851.png
2008-08-27_062851.png
Bubba parodies Microsoft Bob

OsaSoft Bubba - Microsoft Bob Parody

OsaSoft Bubba - Microsoft Bob Parody

Arguably the most infamous product to ever come out of Redmond was Microsoft Bob. Bob was Microsoft’s attempt to create an easier to use interface for Windows 3.1 and Windows 95. It was the Edsel of software.

Here’s a parody of Bob called Bubba. Bubba takes a down-home twist on Bubba. Although originally developed for Windows 3.1, it still runs in Windows XP, Windows Vista, and even Linux.

This is Bubba running under Windows Vista.rn

rnFind out more about Bubba in Classics Rock:rnhttp://www.techrepublic.com/blog/classic-tech/?p=169

Bubba parodies Microsoft Bob

Here’s the original version of Microsoft Bob. Bob’s main menu is a comfortable living room, but this is the Barn which was also included.

As you can see, it’s very Bubba-like.

Bubba parodies Microsoft Bob

When you start Bubba, you’re greeted with Bubba Words Of Wisdumb.

Bubba parodies Microsoft Bob

Bubba is locked 640×480, so you can’t resize the screen. When you do, you’ll get a white border.

Bubba parodies Microsoft Bob

If you click Help, you don’t actually get much help.

Bubba parodies Microsoft Bob

One of the books on Bubba’s Bookshelf launches Control Panel.

Bubba parodies Microsoft Bob

Bubba’s Control Panel launcher will even launch Vista’s Control Panel.

Bubba parodies Microsoft Bob

You can launch a DOS prompt from Bubba.

Bubba parodies Microsoft Bob

In Vista, you get Vista’s DOS box, not the standard Command Prompt.

Bubba parodies Microsoft Bob

Not all of Bubba’s elements are active. If you click an element that doesn’t do anything, you’ll see this.

Bubba parodies Microsoft Bob

Some areas are supposed to launch other things. For example, the cards on the desk will launch Solitaire. If you click one of these things and they don’t work you’ll see this error.

Bubba will then crash and you’ll have to restart it.

Bubba parodies Microsoft Bob

You can create custom launchers in Bubba by modifying the books on the Bookshelf. If you click an empty book, you’ll see this.

Bubba parodies Microsoft Bob

Because Bubba was written for Windows 3.1, it doesn’t understand long file names. You have to use the DOS 8.3 abbreviations for long directory names.

Also the program field is limited to the width of the box. If a program is too deeply buried in subdirectories, you can’t point to it.

Bubba parodies Microsoft Bob

Firefox is on the shelf and ready to be used.

Bubba parodies Microsoft Bob

When you select a book, Bubba checks to make sure that you want to run it.

Bubba parodies Microsoft Bob

Bubba launching Firefox and TechRepublic.

Bubba parodies Microsoft Bob

Bubba will launch other Windows programs. Clicking the typewriter, for example, will get you Vista’s Wordpad.

The Pencil will get you Notepad.

Bubba parodies Microsoft Bob

You can run Bubba under Linux using WINE. It has the same limitations under Linux as it does under Vista – ie, the screen size is locked, the program will crash on unavailable programs, etc.

Bubba parodies Microsoft Bob

Bubba can control WINE and Windows programs in Linux such as the WINE Control Panel. It can’t however launch Linux programs.

  • Microsoft
  • Account Information

    Share with Your Friends

    Bubba parodies Microsoft Bob

    Your email has been sent

Share: Bubba parodies Microsoft Bob
Image of John Sheesley
By John Sheesley
  • Account Information

    Contact John Sheesley

    Your message has been sent

  • |
  • See all of John's content

TechRepublic Premium

  • TechRepublic Premium

    Office relocation checklist

    PURPOSE New office launches and site relocations run the range from straightforward to overly complex. For intricate, sophisticated new office deployments and larger site moves, TechRepublic Premium’s Office relocation checklist can help plan, monitor and execute such projects. From the checklist: LIST REQUIRED OF EQUIPMENT AND SERVICES Begin by creating a simple list of required ...

    Downloads
    Published:  May 25, 2023, 4:00 PM EDT Modified:  May 26, 2023, 11:17 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Onboarding and offboarding IT staff checklist

    PURPOSE Onboarding and offboarding employees requires careful attention. Otherwise, team members may receive insufficient permissions to perform their jobs or continue to have access long after their employment’s termination. Given the stakes, the problem is even worse when managing IT staff permissions, so it’s imperative that your company adopts a system to ensure consistency. Employees, ...

    Downloads
    Published:  May 24, 2023, 4:00 PM EDT Modified:  May 25, 2023, 9:19 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    10 must-know Firefox tips

    PURPOSE TechRepublic Premium presents 10 tips for the Firefox open-source browser. Even if you only follow some of these, you’ll find your browser experience to be much improved. From the article: 1. USE CAUTION WITH ADD-ONS AND THEMES This is one of the first tips I always offer. I’ve seen web browsers with so many ...

    Downloads
    Published:  May 23, 2023, 4:00 PM EDT Modified:  May 24, 2023, 6:46 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Bring your own device policy

    PURPOSE The purpose of this Bring your own device policy from TechRepublic Premium is to provide requirements for BYOD usage and establish the steps that both users and the IT department should follow to initialize, support and remove devices from company access. These requirements must be followed as documented in order to protect company systems ...

    Downloads
    Published:  May 22, 2023, 4:00 PM EDT Modified:  May 23, 2023, 7:26 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice