Feeds

Users smash up PCs in outbreaks of network rage

Survey reveals mice are frequently assaulted – cables ripped out, balls stomped on etc

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Violent acts against computers have become such a problem that behavioural psychologists have branded this digital vandalism as "network rage." Eighty-three per cent of network managers surveyed reported abusive and often violent behaviour by users as a result of computer problems. Acts of wanton violence resulted in shattered monitors, smashed keyboards and kicked-in hard drives. Sometimes the PC GBH was so bad it was impossible to make out the identity of mice that had been flung across a room -- their plastic shells dashed against walls and shattered into tiny fragments. "When people are under a lot of pressure from supervisors and managers to meet tight deadlines, they can become frustrated and lose control of their temper," said Boston-based psychologist Dr Will Calmas. "Instead of voicing their frustrations to their supervisors, some people choose to take out their aggression on inanimate objects -- in this case, their monitor, keyboard or mouse." According to the survey conducted by Concord Communications, the number one piece of equipment broken during an act of network rage is the keyboard. Broken mice and shattered monitors tied for second place and kicked-in hard drives placed third. One network manager who asked to remain anonymous said: "I had a user who complained that her cursor would not move, so she would repeatedly slap the terminal on one side to move it." And another told of how one irate woman was close to breaking point after being unable to send any e-mail. "After I calmed her down, I asked to see a sample of an email message she was trying to send. The email address included street name, town, county and full postal code." * If you've witnessed network rage first hand -- or wish to admit to battering a PC from time to time -- why not share your experiences at The Register's Message Board. ®

Internet Security Threat Report 2014

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.