You could always tell when a sysadmin started hacking up some software by the if-else nesting chains.