Feeds

BOFH and the Nigerian 419

Help the PFY launder his ill-gotten gains

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Episode 24 BOFH 2002: Episode 24

Dear Reader,

Allow me the opportunity of presenting a commercial proposition to you that would be mutually beneficial. I got your name and contact from the heeeuge database of Register readers which they use to send unsolicited email and dob people in to their bosses for wasting company time on the web all afternoon when they get back from the pub.

I consulted many sources of information on the web, including several search engines, a web self help utility, and 321 porn sites. They all agreed that you were a reliable person of good character apart from the fetish for donkeys and tomato paste. For this reason I feel that I can confide in you - and only you - my true identity. I am The PFY, otherwise know to you as the Pimply Faced Youth, assistant to the Bastard Operator From Hell.

As you know, The Bastard is a very wealthy person, having stolen, lied, cheated and blackmailed his way into several dubious consulting positions, including the one he now holds with a large and very cash-rich company. In recent days, the Bastard Operator from Hell has gone on an extended holiday under the guise of searching the web for a secure version of Explorer, and is not expected back for several years.

Before he left, he deposited a large amount of his wealth in a room in the basement of the company building, carefully labelled so as to frighten any inquisitive person from ever thinking of opening it. (I.e. "Audio Tapes - Larry Ellison on the Future of Computing, Bill Gates on Microsoft's Vision and Richard Stallman on Free Beer"). A conservative estimate of this wealth is several thousand British Pounds, with a street value of several thousand English Pounds, or several billion turkish lire (or a couple of trillion Turkish lire if you read this in a couple of weeks, allowing for devaluation).

No-one apart from myself knows where this money is hidden as The Bastard was careful to wait until 4:58pm, when no-one was left in the building (and before night security clocked in) to put the money in place.

I am now looking for a partner to help me invest these ill-gotten gains in high return stocks and bonds.

I am humbly seeking your assistance in the following ways so that I can begin the transfer of this money to you to invest:

  • To serve as guardian of this money until I can transfer it (in suitcasefuls, so as not to attract attention) from it's storage.
  • To make arrangements for my accomodation, meals and entertainment expenses, as it might be insecure for me to be seen my home until the transfer is complete

In return for your time and aid, I am fully prepared to give you half - that is 50% - of the contents of the locked briefcases when they have all been transferred from the company, to do with as you please. I am sure that you will agree that this is a most lucrative offer, and one which is unlikely to be made to just anyone.



Should you be willing to partake in this venture and assist me in this undertaking, you can be assured that it will be concluded in a matter of a few weeks and with the utmost discretion. Any notification to the Inland Revenue authorities of the money is a matter up to you and you alone.

I look forward to corresponding with you via email about this exciting opportunity in the near future - however, I would stress the need for security and discretion in this undertaking as my supervisor has a paranoia verging on ESP when it comes to losing any of his investments. Should he find out of the venture I am proposing, I am sure that his reaction would be both swift and vio

asf;erio ®

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.