Skip to content

TechRepublic

Trending Now

In the Modern Data Center: IT Engineer Installs New HDD Hard Drive and Other Hardware into Server Rack Equipment. IT Specialist Doing Maintenance, Running Diagnostics and Updating Hardware.
Image: Gorodenkoff/Adobe Stock
Article

How to use NordLocker to securely back up files for your business

Human head with lock hole in digital background. Concept of artificial intelligence, machine learning, or ethics of AI
Image: enzozo/Adobe Stock
Article

How to develop competency in cyber threat intelligence capabilities

Hacker in data security concept. Hacker using laptop. Hacking the Internet. Cyber attack.
Image: Adobe Stock
Article

Is REvil having a resurgence, or is there a copycat hacking group?

Hand showing laptop computer with cloud.
Image: Adobe Stock
Article

Report: 82% of IT leaders are adopting the hybrid cloud

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Developer

Looking back at other Microsoft Easter Eggs

By greg shultz September 28, 2007, 11:32 PM PDT

Image
1
of 7
Previous Next

Title_Page.png
Title_Page.png
Looking back at other Microsoft Easter Eggs

By Greg Shultz

By Greg Shultz

Microsoft developers from various development projects hid Easter Eggs in their applications. While the majority of Easter Eggs are designed to give credit to the developers, some are just plain goofy. Let’s take a look.

Looking back at other Microsoft Easter Eggs

Internet Explorer 4.0

Internet Explorer 4.0

You’ll then see an introductory message over top of the enlarged e icon.

Looking back at other Microsoft Easter Eggs

FrontPage 2000

FrontPage 2000

As the Easter Egg progresses along, multiple names will fly across the screen.

Looking back at other Microsoft Easter Eggs

Imaging for Windows

Imaging for Windows

Windows 98 included an imaging package that Microsoft licensed from Kodak called Imaging for Windows. This program could be used to view, print, or manage images from faxes, scanners, or graphics programs. As you can imagine, the developers decided to put an Easter Egg in the application.

To access this Easter Egg from within Imaging, pull down the Help menu, and select the About Imaging command.

Looking back at other Microsoft Easter Eggs

Microsoft Chat 2.5

Microsoft Chat 2.5

Finally, one of the Avatars decided to put a stop to the Easter Egg.

Looking back at other Microsoft Easter Eggs

Microsoft Diagnostics 2.0

Microsoft Diagnostics 2.0

To access this Easter Egg from within MSD, you press [Alt] H or click Help, if you had a mouse.

Looking back at other Microsoft Easter Eggs

Hid.dll

Hid.dll

In Windows 98, there is a USB related DLL file called Hid.dll. While this file is not an actual program and does not contain a standard, credits type of Easter Egg, there is a humorous comment hidden in the file. To see it you have to locate the file Hid.dll in the Windows\System folder and then open it in Wordpad. As soon as you do, you’ll see this humorous comment in line 6.

  • Developer
  • Account Information

    Share with Your Friends

    Looking back at other Microsoft Easter Eggs

    Your email has been sent

Share: Looking back at other Microsoft Easter Eggs
Image of greg shultz
By greg shultz
My first computer was a Kaypro 16 \"luggable\" running MS-DOS 2.11 which I obtained while studying computer science in 1986. After two years, I discovered that I had a knack for writing documentation and shifted my focus over to technical writing.
  • Account Information

    Contact greg shultz

    Your message has been sent

  • |
  • See all of greg's content

TechRepublic Premium

  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire a Security Analyst

    Recruiting a Security Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This hiring kit from TechRepublic Premium includes a job description, sample interview questions and a basic want ad that you can customize for your business to find, interview, recruit and hire the best candidates for a ...

    Downloads
    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 2:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Membership
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice