Feeds

102 ways to kill your computer

This guy melted a NeXT Cube with a blow torch

  • alert
  • submit to reddit

High performance access to file storage

Update 2 Thanks to everyone who sent us their killer computer links. We've compiled them all at the end of this article for ease of reference.

NeXT please

The casings for NeXT Cubes are as light as plastic (reader Sean Lukes writes), but phenomenally difficult to destroy, as they are made out of solid magnesium. Yet when he was a columnist for NeXTworld magazine, Simson Garfinkel wrote an article on his attempts to set the magnesium casing in an old Cube ablaze. It took a very hot blowtorch and other preparations, but he finally got it going, and boy does magnesium burn! He still has a picture of it here.

Desperate Dan

By far the most popular submission was Dan's Data, an Australian site which gets straight to the point in "How to destroy your PC."

With sections such as "Static is Your Friend", "Get it Wet", and "Killing Chips", Dan counsels: "Remember -- slapdash, ill-informed, incompetent work is what's expected of you. Don't let the industry down."

Project Eunuch

And so to Project Eunuch, British ingenuity at its best. Using a fridge freezer and alcoholic beverages (hence Eunuch -- The Extreme Use of Nearly Universal Cooling Hardware), the Castratis overclock a 486 PC made from scrap components to 247MHz.

Or rather they blow up a 486 PC, as they explain with remarkable lack of shame.

"It would appear that after all the motherboard jumpers were removed for storage, someone accidently powered the system up. This caused the whole setup to run uncontrollably fast. Fortunately, one of the technicians (the one who had destroyed the least of the "coolant") had the presence of mind to check the clock speed... 247MHz!

"There was only one thing to do. Halflife.

"Completely playable, the game ran fine for 2 minutes and 34 seconds (or 3 minutes 12 seconds, depending on who you listen to...) then crashed horribly. By this time, however, the processor was utterly wrecked. As was the motherboard. And the power supply, graphics card, soundcard and RAM. Most of the Holy Spirits had boiled too.

"The only thing to survive the ordeal was the freezer, proving that superior British engineering always prevails (or something)."

Wally Dug

Now for something completely peculiar -- the Scottish gaelic-speaking, Amiga-loving, self-proclaimed genius, Wally Dug. Check this out for a saboteur's guide on how to make your own storage media, using inter alia four muffins and two litres of Irn Bru (Scotland's national fizzy drink).

Texan Lynching

What is it with Texans and Guns? First, Texan nationalist Kyle of HardOCP, renown has a link to an old 486 getting overhauled with a shotgun and a .22 here. Then we have this tale from Ron Dear, witness to an attempted computer homicide some years ago at a "large retailer based in Dallas, TX".

"The retailer had "installed a 'new' machine and it just never quite got into the 'groove'. For a number of weeks, the hardware people could not get together with the software people and the machine would continue to crash at random intervals. The purchasing department had been entering orders... and I believe it was about the fifth time they had to re-enter all the purchase orders when the incident came to a head.

"This young lady of gargantuan proportions storms into the computer room yelling and screaming and waving her limbs in a serious display of agitation. As I was about to inquire about her problems and how I could assist her... she removed a .357 from her purse! I politely excused myself and vacated the premises... then called security. She never did shoot the machine, but I thought it would be prudent for me to NOT BE THERE!"

Hammer, safety glasses, cutting tool

We are indebted to Jonathan Margolis and the Sunday Times for alerting us to
The Illustrated Guide to Breaking Your Computer.

Author Tom Murphy VII (is he a clone?) offers step-by-step instructions in how to partition a disk-drive using a hack-saw. This method is "advantageous over fdisk because it allows partitioning of individual platters and is independent of operating system. You also get to make cute designs".

Murphy VII also tells you how to destroy CRTs, under the heading: "Monitor + Hammer = Good Clean Fun!". There is a health warning attached with this activity which "can actually be dangerous and bad if you are unsafe about it, so be careful".

It is, however, a matter of some debate as to how careful you can be using Murphy VII's suggested "apparatus" of hammer, safety glasses, glass cutting tool, long crowbar and short crowbar (optional)". Monitors explode. Extreme caution is needed here.

Art for Art's sake

Murphy VII is a no-nonsense PC demolition man. Kay Buena is a very different animal: she blows up PCs in the name of art. You can check out her exploits here.

Blame it on Microsoft

It's not so spectacular -- a reader, who prefers to remain anonymous writes -- but my favorite way to destroy a really annoying person's PC is simple. Rub some fine grit steal wool above the expansion slots. Plug a junk card into each slot then remove.

The fine strands of steal will create intermittent shorts and will drive them insane. e.g. fiber shifts slightly, shorts two contacts. Crashs machine, and burns (the fiber not the machine). Repeats until they get a new computer. Don't worry, Microsoft will take the heat.

Booby trap your PC

This link at I Am Not A Geek tells you how to booby trap your PC. Unfortunately, physical destruction is confined to data and you need a modicum of coding ability - you have to use the dreaded DEBUG utility to prevent intrusion.

Too bad it is out of print

http://www.amazon.com/exec/obidos/ASIN/0961253894/103-4224137-8330250
Computers Are Useless: One Hundred Uses for a Dead Computer

Library of Congress Entry

Computers are useless: 100 uses for a dead computer / by James M. Ley

LC Control Number: 83051250
Type of Material: Book (Print, Microform, Electronic, etc.)
Brief Description: Ley, James M.
Computers are useless: 100 uses for a dead computer / by James M. Ley;
drawings by Eileen M. Logsdon.
Sunnyvale, CA : Thunderbolt Publications, c1983.
[94] p. : chiefly ill. ; 14 x 21 cm.

Help us to help you

Are there any more Killer PC sites out there? Email us here.

Related stories

Woman hacks into husband's PC - literally
Half of users attack their PCs
Users smash up PCs in outbreaks of network rage
Build your own Klingon disrupter

Killer PC reference library

The Register offers PC cleaning tips
Bad Day Office worker captured on CCTV destroying PC. Stunt unfortunately, but still amusing Dan's Data: How to destroy your PC
Project Eunuch
NeXT cubefire
Kay Buena kills in the name of art
The Illustrated Guide to Breaking Your Computer
Wally Dug
Booby trap your PC
486 firing range
Fully automatic: Thompson, M-16, and M-11
Identical disk drive platters: different bullets

Fun with phones

Mobile Squelcher jams cellphone calls
Mobile Phone Squelchers - - Register readers weigh in

Bastard Operator from Hell

BOFH 2000: Kit and Caboodle ®

High performance access to file storage

More from The Register

next story
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Lego is the TOOL OF SATAN, thunders Polish priest
New minifigs like Monster Fighters are turning kids to the dark side
Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine
Only I can 'make an empire out of a republic' intones presidential candidate
Chinese company counters pollution by importing fresh air
Citizens line up for bags of that sweet, sweet mountain air
Google asks April Fools: Want a job? Be our 'Pokemon Master'
Mountain View is prankin' like it's 1999...
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.