Feeds

Dell in front line of War on Terror™

No PDAs for al-Qaeda, that's for sure

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

We're relieved to report today that al-Qaeda will not be sourcing PDAs online from US websites, well not from Dell at least.

Reader Stephen Mills alerted us to the company's stringent security checks which vet potential purchasers. As a result, we can sleep sounder in our beds safe in the knowledge that Osama bin Laden will not have the comfort of reading the new Register Mobile in whichever stinking hole in the ground he is currently occupying.

To demonstrate how the thing works, we signed into Dell's e-shop this morning using a fictitious US address and chucked the first PDA we saw in the shopping basket. On proceeding to the checkout, we were asked some probing questions, these included:

Thanks to Dell, we can all sleep sounder in our beds

Being an honest terrorist organisation, we frankly stated that the PDA was for export to Chad (Afghanistan, Iraq, Libya, North Korea and Syria being unavailable as options), that the intended use was government/military and that the product would indeed be used in connection with weapons of mass destruction.

Having pressed "continue" with some trepidation, we fully expected that, after a suitably dramatic pause, heavily-armed SWAT teams supported by spooks bearing a one-way ticket to Guantanamo Bay and nuke-laden stealth aircraft would surround the building demanding immediate surrender.

But no. Instead we were invited to proceed to the payments page and enter credit card details for immediate shipment. It was at this point that we made our excuses and left the Dell website.

Of course, it's likely that Dell's cunning plan involves taking the credit card payment for intelligence-gathering purposes and then sending in the helicopter gunships.

Either way, it would clearly take all of the cunning and guile of an evil criminal mastermind to penetrate such online defences. We salute Dell and its constant vigilance. ®

Internet Security Threat Report 2014

More from The Register

next story
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
Bible THUMP: Good Book beats Darwin to most influential tome title
Folio Society crowns fittest of surviving volumes
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.