Feeds

For sale: One annoying tw*t of a girlfriend

More eBay auction fun and games

  • alert
  • submit to reddit

Security for virtualized datacentres

Updated There's no doubt that eBay really is a vast improvement on the old Exchange and Mart when it comes to getting rid of unwanted items. Like girlfriends, for instance.

Indeed, where else could you expect to attract a bid of £10,000,000 for one second-hand partner, described thus?:

One annoying twat of a girlfriend. WARNING GOODS ARE DEFECTIVE!!! Slightly overweight. Teeth are cold (they come with little yellow jackets). Boring as hell. More varied sexlife available from a bag of spuds. She will two tone any residence she is allow access to in samba and sickly yellow, symbolic of a effeminate mexican. Can't/won't/shouldn't be allowed to cook (this may result in poisoning). Owner is forced to sell in order that he be able to gain access to the TV and stop the bitch watching poxy DIY programs despite not knowing which end of a paintbrush to hold. Buyer will collect and never ever return. Attempts at refunds or returns may result in actual bodily harm. Please please please bid now!!! Hopefully said girlfriend will make her own bloody way to buyer saving P&P.

We note that the seller has quite correctly listed his unwanted other half under "Everything Else: Household Appliances". The photo is a nice touch, too, and doubtless contributed to the healthy bidding war.

Readers are advised to enjoy this bit of tomfoolery while they can. Following our report two weeks ago on the four geeks offering themselves for a date, eBay quickly pulled the plug on the auction. Sadly, it appears that eBay's sense of humour is currently as elusive as an Iraqi weapon of mass destruction. For shame. ®

Update

Yup, it took eBay two minutes to kill this auction. Well, we anticipated this. For your viewing pleasure, we are pleased to reproduce the picture which complimented the sale. Please note that we have added "porn bars" and Body Shop sea urchin and guava face mask to protect the innocent:

Yours for £10m - one unwanted girlfriend

Bootnote

We can't help feeling that the vendor in this case is a prime candidate to receive one of our

Clever Trevor limited edition t-shirts

. Now

there

was a man looking to have his vitals chopped off with a carving knife.

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.